From owner-freebsd-questions Tue Apr 28 13:50:53 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id NAA02230 for freebsd-questions-outgoing; Tue, 28 Apr 1998 13:50:53 -0700 (PDT) (envelope-from owner-freebsd-questions@FreeBSD.ORG) Received: from gdi.uoregon.edu (gdi.uoregon.edu [128.223.170.30]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id NAA02217 for ; Tue, 28 Apr 1998 13:50:34 -0700 (PDT) (envelope-from dwhite@gdi.uoregon.edu) Received: from localhost (dwhite@localhost) by gdi.uoregon.edu (8.8.7/8.8.8) with SMTP id NAA11971; Tue, 28 Apr 1998 13:50:20 -0700 (PDT) (envelope-from dwhite@gdi.uoregon.edu) Date: Tue, 28 Apr 1998 13:50:20 -0700 (PDT) From: Doug White Reply-To: Doug White To: joe ferguson cc: freebsd-questions@FreeBSD.ORG, Hans Huebner Subject: Re: Does this deserve send-pr? In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Thu, 23 Apr 1998, joe ferguson wrote: > I have to agree with Hans. If there is a user command which can > crash the kernel, it is a gross security violation as well as > a violation of Unix philosophy. I've had enough such problems > with popular desktop operating systems! However, Joe Bloe User can't run this, only the sysadmin can. It's assumed the sysadmin knows what they're doing, otherwise they wouldn't be the sysadmin. :) The mount syscall is one of the more powerful (and dangerous) commands in the system -- use with care. If he had mounted a CD with just device nodes on /dev, it would have worked, actually. A decent idea when trying to unspam a system. Or when adding DEVFS. Doug White | University of Oregon Internet: dwhite@resnet.uoregon.edu | Residence Networking Assistant http://gladstone.uoregon.edu/~dwhite | Computer Science Major To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message