Date: Tue, 22 May 2012 21:53:54 -0500 (CDT) From: Robert Bonomi <bonomi@mail.r-bonomi.com> To: freebsd-questions@freebsd.org, tomdean@speakeasy.org Subject: Re: Using inb() and outb() Message-ID: <201205230253.q4N2rsdN078363@mail.r-bonomi.com> In-Reply-To: <4FBC4B20.8070100@speakeasy.org>
next in thread | previous in thread | raw e-mail | index | archive | help
> From owner-freebsd-questions@freebsd.org Tue May 22 21:30:21 2012
> Date: Tue, 22 May 2012 19:27:44 -0700
> From: "Thomas D. Dean" <tomdean@speakeasy.org>
> To: freebsd-questions@freebsd.org
> Subject: Re: Using inb() and outb()
>
> On 05/22/12 17:09, Eitan Adler wrote:
> > On 22 May 2012 14:25, Thomas D. Dean<tomdean@speakeasy.org> wrote:
> >> On 05/22/12 14:08, Robert Bonomi wrote:
> >>
> >> That is what I thought.
> >>
> >> The entire operation will have to run as root. Nothing will be non-root.
> >
> > Can you make a SUID helper which only does the inb/outb operations as root?
> >
>
> I am planing to move the higher level functions to a driver.
>
> I really want a userland interface to the process.
It just occured to me -- you could do a 'daemon' process that ran as the
superuser, and provided the hardware-level services to a non-root client
via, say, RPC, or a bare 'socket' ('unix' or 'ip') connection.
Doing the I/O via RPC would be 'interesting', in that the 'device' could
be physically connected to one machine (almost an 'embedded'-class micro-
controller), while the vast majority of the 'control progrm' could run on
an entirely different machine.
If you're up to doing the device-driver coding, it is a =better= solution,
because then you can use the filesystem access-control mechanisms to limit
access to the 'device'.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201205230253.q4N2rsdN078363>
