Re: cpuctl(formely devcpu) patch test request

From: Stanislav Sedov <stas_at_FreeBSD.org>
Date: Fri, 6 Jun 2008 02:55:33 +0400
On Thu, 05 Jun 2008 22:12:29 +0000
"Poul-Henning Kamp" <phk_at_phk.freebsd.dk> mentioned:

> In message <20080606020927.8d6675e1.stas_at_FreeBSD.org>, Stanislav Sedov writes:
> 
> >The updated patch is available at
> >http://www.springdaemons.com/stas/cpuctl.2.diff
> 
> Have we fully thought though the potential for halt&catch_fire ?
> 
> Would it make sense to have a more granular security model than 
> the simple device-node access based "are you root?" test ?

There's a check that prevents playing with cpuctl if
securelevel is greater than 0. And if it's 0 you can always
execute any code you want in kernel mode.

Or you're talking about something different?

-- 
Stanislav Sedov
ST4096-RIPE

Received on Thu Jun 05 2008 - 20:55:39 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:39:31 UTC