From owner-freebsd-hackers Sun Jan 18 02:21:19 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id CAA02311 for hackers-outgoing; Sun, 18 Jan 1998 02:21:19 -0800 (PST) (envelope-from owner-freebsd-hackers@FreeBSD.ORG) Received: from godzilla.zeta.org.au (godzilla.zeta.org.au [203.2.228.19]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id CAA02245; Sun, 18 Jan 1998 02:20:46 -0800 (PST) (envelope-from bde@godzilla.zeta.org.au) Received: (from bde@localhost) by godzilla.zeta.org.au (8.8.7/8.8.7) id OAA13387; Sun, 18 Jan 1998 14:29:57 +1100 Date: Sun, 18 Jan 1998 14:29:57 +1100 From: Bruce Evans Message-Id: <199801180329.OAA13387@godzilla.zeta.org.au> To: bde@FreeBSD.ORG, dg@FreeBSD.ORG, pst@juniper.net Subject: Re: isdisk() kludge in kernel Cc: hackers@FreeBSD.ORG Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk >I was looking at isdisk and wanted to hurl chunks. > >This is used by spec_open to determine if we should be allowed to open a >disk device when securelevel >= 1. It isn't even used in -current. >I'd like to propose changing spec_open to simply NEVER allowing the open of >a block device, or character device, if a character device has a block >device associated with it and eliminate isdisk() in kern_conf entirely. This would break at least backups to SCSI tape devices, since st has both block and character devices, but tapes aren't disks. Perhaps the broken version is correct - isdisk() really means isasecurityholeifmountable(). Bruce