From owner-freebsd-current Thu Nov 6 06:49:57 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id GAA20366 for current-outgoing; Thu, 6 Nov 1997 06:49:57 -0800 (PST) (envelope-from owner-freebsd-current) Received: from time.cdrom.com (root@time.cdrom.com [204.216.27.226]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id GAA20360 for ; Thu, 6 Nov 1997 06:49:53 -0800 (PST) (envelope-from jkh@time.cdrom.com) Received: from time.cdrom.com (jkh@localhost.cdrom.com [127.0.0.1]) by time.cdrom.com (8.8.7/8.6.9) with ESMTP id GAA08658; Thu, 6 Nov 1997 06:49:13 -0800 (PST) To: joerg_wunsch@uriah.heep.sax.de (Joerg Wunsch) cc: freebsd-current@FreeBSD.ORG Subject: Re: [Fwd: Malicious Linux modules - be worried !] In-reply-to: Your message of "Thu, 06 Nov 1997 09:11:49 +0100." <19971106091149.JR42640@uriah.heep.sax.de> Date: Thu, 06 Nov 1997 06:49:13 -0800 Message-ID: <8654.878827753@time.cdrom.com> From: "Jordan K. Hubbard" Sender: owner-freebsd-current@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk Yeah, yeah, so I sent that message before reading Garrett and everyone else's messages about how that worked already. :-) > As Jordan K. Hubbard wrote: > > > Perhaps we should add a hook to disable the > > loading of LKMs entirely if the secure level is above a certain > > number. > > You mean, something like these checks? :-) > > /sys/kern/kern_lkm.c: if ((flag & FWRITE) == 0 || securelevel > 0) > /sys/kern/kern_lkm.c: if ((flag & FWRITE) == 0 || securelevel > 0) > /sys/kern/kern_lkm.c: if ((flag & FWRITE) == 0 || securelevel > 0) > /sys/kern/kern_lkm.c: if ((flag & FWRITE) == 0 || securelevel > 0) > /sys/kern/kern_lkm.c: if ((flag & FWRITE) == 0 || securelevel > 0) > > -- > cheers, J"org > > joerg_wunsch@uriah.heep.sax.de -- http://www.sax.de/~joerg/ -- NIC: JW11-RIPE > Never trust an operating system you don't have sources for. ;-)