On Thu, 05 Jun 2008 22:12:29 +0000 "Poul-Henning Kamp" <phk_at_phk.freebsd.dk> mentioned: > In message <20080606020927.8d6675e1.stas_at_FreeBSD.org>, Stanislav Sedov writes: > > >The updated patch is available at > >http://www.springdaemons.com/stas/cpuctl.2.diff > > Have we fully thought though the potential for halt&catch_fire ? > > Would it make sense to have a more granular security model than > the simple device-node access based "are you root?" test ? There's a check that prevents playing with cpuctl if securelevel is greater than 0. And if it's 0 you can always execute any code you want in kernel mode. Or you're talking about something different? -- Stanislav Sedov ST4096-RIPE
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:39:31 UTC