Re: establishing the callers PID

2002-05-13 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Niels Möller) writes: > [EMAIL PROTECTED] (Thomas Bushnell, BSG) writes: > > > Right, but that's already a Hurd-specific extension. So it's fine to > > expect it to use another Hurd-specific extension to get a reliable PID > > or other identification. > > What would such an

Re: establishing the callers PID

2002-05-12 Thread Niels Möller
[EMAIL PROTECTED] (Thomas Bushnell, BSG) writes: > Right, but that's already a Hurd-specific extension. So it's fine to > expect it to use another Hurd-specific extension to get a reliable PID > or other identification. What would such an extension look like? /Niels __

Re: establishing the callers PID

2002-05-11 Thread Thomas Bushnell, BSG
Marcus Brinkmann <[EMAIL PROTECTED]> writes: > Mmh, we could restrict the monitor to trusted filesystems (eg /). Right, but that's already a Hurd-specific extension. So it's fine to expect it to use another Hurd-specific extension to get a reliable PID or other identification. > I am not reall

Re: establishing the callers PID

2002-05-11 Thread Marcus Brinkmann
On Sat, May 11, 2002 at 06:02:18PM -0700, Thomas Bushnell, BSG wrote: > Marcus Brinkmann <[EMAIL PROTECTED]> writes: > > > I think it is absolutely mandatory that we establish the PID in a > > trustworthy way rather than let the user provide some unique ID on its own. > > I think there is already

Re: establishing the callers PID

2002-05-11 Thread Thomas Bushnell, BSG
Marcus Brinkmann <[EMAIL PROTECTED]> writes: > I think it is absolutely mandatory that we establish the PID in a > trustworthy way rather than let the user provide some unique ID on its own. > I think there is already a place in the Hurd where we should do that but > don't (wasn't that term's ter

establishing the callers PID

2002-05-11 Thread Marcus Brinkmann
Hi, for POSIX locking and shared memory, the filesystem needs to establish the callers identity (its PID). Well, actually, in some cases, a system wide unique ID would be enough. For example in the case of file locks, it would be enough to have a send right to a receive right in the caller's ta