On Jul 19, 2005, at 11:24 AM, Matt Hope wrote:
That's basically right. 'condor_compile' links the user application with our special version of libc which provides its own implementations of the system calls (which usually involve talking to the shadow process on the submit machine). Note that this is not meant to be a secure method of sandboxing the application to prevent malicious behavior. The user code can easily execute system calls directly on the execute machine if it really wants to (by trapping directly to the kernel). +----------------------------------+---------------------------------+ | Jaime Frey | Public Split on Whether | | jfrey@xxxxxxxxxxx | Bush Is a Divider | | http://www.cs.wisc.edu/~jfrey/ | -- CNN Scrolling Banner | +----------------------------------+---------------------------------+ |