Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 30 Dec 1995 20:33:09 -0500 (EST)
From:      Sujal Patel <smpatel@wam.umd.edu>
To:        Joerg Wunsch <joerg_wunsch@uriah.heep.sax.de>
Cc:        FreeBSD Hackers <freebsd-hackers@freebsd.org>
Subject:   Re: /dev/io
Message-ID:  <Pine.BSF.3.91.951230201025.252A-100000@sl-039.sl.cybercomm.net>
In-Reply-To: <199512302111.WAA01418@uriah.heep.sax.de>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 30 Dec 1995, J Wunsch wrote:

> Is there any good reason why access to /dev/io is allowed for members
> of group kmem?  Note that this will give any setgid kmem program
> _full_ (read and write) access to the io registers (since open() is
> the only important action for this device).

While we're on the topic of /dev/io, I have a couple of comments about it. 
It seems unintuitive to offer a process IO permission by opening a device
(especially since opening it with RDONLY or RDWR is irrelevant).  I know
that NetBSD changed this implementation after 1.0 to support i386_iopl(),
i386_get_ioperm(), and i386_set_ioperm() calls.  Also, Linux uses a set 
of calls very similar to NetBSD's.

To me it seems like it would be more "standard" if FreeBSD supported an
implementation like NetBSD's.  It would also pave the way for the
implementation of IO permission bitmaps (if they are ever needed).  Changing
it would probably be a little more secure, and I can't even think of any 
programs that would break if /dev/io was removed?

Any comments?  I'm interested in hearing about this...


Sujal



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.951230201025.252A-100000>