From owner-cvs-sys Mon Nov 11 14:08:06 1996 Return-Path: owner-cvs-sys Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id OAA14079 for cvs-sys-outgoing; Mon, 11 Nov 1996 14:08:06 -0800 (PST) Received: (from sos@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id OAA14008; Mon, 11 Nov 1996 14:07:28 -0800 (PST) Date: Mon, 11 Nov 1996 14:07:28 -0800 (PST) From: Soren Schmidt Message-Id: <199611112207.OAA14008@freefall.freebsd.org> To: CVS-committers, cvs-all, cvs-sys Subject: cvs commit: src/sys/i386/isa syscons.c Sender: owner-cvs-sys@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk sos 96/11/11 14:07:24 Branch: sys/i386/isa RELENG_2_2 Modified: sys/i386/isa syscons.c Log: 1. Avoid a race in scclose(). tty.c has kludges so that the race is actually harmless. 2. Fixed code to match comment in scintr(). 3. Don't allow even root to take control of the machine when securelevel > 0. I've secured the accesses to PSL_IOPL in all drivers and asked pst to review it, but he seems to be busy. Write access to /dev/kmem and other critival devices currently leaks across raisings of securelevel via open fd's, so there may as well be a similar leak for PSL_IOPL. 4. (Most important.) Don't corrupt memory beyond the screen buffers if the cursor happens to be off the 80x25 screen when syscons starts. 5. Fix console cursor update (not perfect yet). Submitted by: bruce Revision Changes Path 1.182.2.2 +15 -5 src/sys/i386/isa/syscons.c