Securelevels and /dev/io documentation inconsistency
Giorgos Keramidas
keramida at freebsd.org
Wed Jul 12 14:12:33 UTC 2006
On 2006-07-12 15:47, Alexandros Kosiaris <akosiaris at gmail.com> wrote:
> Hello,
>
> I believe i have stumbled upon a documentation inconsistency
> concerning securelevels and usage of /dev/io
>
> >From init(8) manpage
>
> 1 Secure mode - the system immutable and system append-only flags may
> not be turned off; disks for mounted file systems, /dev/mem,
> /dev/kmem and /dev/io (if your platform has it) may not be opened
> for writing; kernel modules (see kld(4)) may not be loaded or
> unloaded.
>
> Note the "may not be opened for writing". It is correct for /dev/mem
> and /dev/kmem but incorrect for /dev/io as the following experiment
> shows:
>
> 3:40pm ~ # sysctl kern.securelevel
> kern.securelevel: 1
> root at mybox
> 3:40pm ~ # head /dev/io
> head: /dev/io: Operation not permitted
> root at mybox
> 3:40pm ~ #
>
> Now the source code in /usr/src/sys/i386/i386/io.c just checks if
> securelevel is greater that 0 when opening the device and return
> accordingly.
>
> However from io(4)
>
> Note that even read-only access will grant the full I/O privileges.
>
> Which means that changing the code to check if the device is opened
> O_RDONLY and then allowing access would be a mistake cancelling the
> idea of blocking access to the device through usage of the
> securelevel.
>
> I am correct about the above ?
> Does the documentation need a correction in that place?
It looks like it does. Would something like this be satisfactory?
1 Secure mode - the system immutable and system
append-only flags may not be turned off; disks for
mounted file systems, /dev/mem and /dev/kmem may not be
opened for writing and /dev/io (if your platform has it)
may not be opened at all; kernel modules (see kld(4))
may not be loaded or unloaded.
Regards,
Giorgos
More information about the freebsd-current
mailing list