Re: [PATCH] Allow /dev/{,k}mem to be disabled to prevent kernel from being modified easily

From: Willy Tarreau (willy@w.ods.org)
Date: Sun Aug 03 2003 - 15:26:41 EST


On Sun, Aug 03, 2003 at 09:18:33PM +0200, bert hubert wrote:
 
> Well, I fear the runtime overhead - as it is, I suspect this patch is
> somewhat inflamatory anyhow ('tough luck you were hacked', 'you are fscked
> anyhow').

I don't worry about this on opening *mem !

> I'll whip up a dynamic patch soonish - I'm unsure about the right location,
> /proc/sys/ something?

hmmm something such as /proc/sys/kernel/secured ?

You could even implement 3 levels :
 - 0 = normal
 - 1 = secured, but can go back to 0. At least this stops automated scripts.
 - 2 = secured and cannot go back to lower level anyhow.

Cheers,
Willy
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Thu Aug 07 2003 - 22:00:22 EST