Date: Thu, 9 Sep 2010 14:37:21 -0400 From: John Baldwin <jhb@freebsd.org> To: freebsd-stable@freebsd.org Cc: Gareth de Vaux <bsd@lordcow.org>, stable@freebsd.org, Kurt Jaeger <pi@opsec.eu>, Jack Vogel <jfvogel@gmail.com> Subject: Re: MSIX failure Message-ID: <201009091437.21563.jhb@freebsd.org> In-Reply-To: <AANLkTi=XqVaAWxuZJ39mK4hYpg6%2Bm04tzN9jsJ7scTD-@mail.gmail.com> References: <AANLkTikdGGgpGhy4MJF_K-ttLvjQOBj%2BAb5r-a2uhJ_Y@mail.gmail.com> <20100909143357.GG34314@home.opsec.eu> <AANLkTi=XqVaAWxuZJ39mK4hYpg6%2Bm04tzN9jsJ7scTD-@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thursday, September 09, 2010 12:41:07 pm Jack Vogel wrote: > On Thu, Sep 9, 2010 at 7:33 AM, Kurt Jaeger <pi@opsec.eu> wrote: > > > Hi! > > > > > > Is this within a jail or something else along those lines? I can't > > > > reproduce the problem otherwise. Frustrating! Someone else on the > > list > > > > might have ideas as to what could cause this. > > > > > > Nope, this's a normal host. I've got securelevel on 1, but doubt that > > > would affect this? > > > > I assume it affects it. > > > > http://www.freebsd.org/doc/en/books/faq/security.html#SECURELEVEL > > > > Basically, when the securelevel is positive, the kernel restricts > > certain tasks; not even the superuser (i.e., root) is allowed to > > do them. > > > > There: > > > > # Write to kernel memory via /dev/mem and /dev/kmem. > > > > So I assume it also restricts reading /dev/kmem ? > > > > > OH YUCK, another root isn't really root, so is it also possibly > the reason for the MSIX failure?? Is this pile, er feature, on by default? securelevel does not affect any of the MSI/MSI-X bits. -- John Baldwin
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201009091437.21563.jhb>