From owner-freebsd-questions Mon Mar 22 11:15:18 1999 Delivered-To: freebsd-questions@freebsd.org Received: from cs.rpi.edu (mumble.cs.rpi.edu [128.213.8.16]) by hub.freebsd.org (Postfix) with ESMTP id 5B99415074 for ; Mon, 22 Mar 1999 11:15:07 -0800 (PST) (envelope-from crossd@cs.rpi.edu) Received: from cs.rpi.edu (monica.cs.rpi.edu [128.213.7.2]) by cs.rpi.edu (8.9.1/8.9.1) with ESMTP id OAA09146; Mon, 22 Mar 1999 14:14:42 -0500 (EST) Message-Id: <199903221914.OAA09146@cs.rpi.edu> To: freebsd-questions@freebsd.org Cc: labstaff@cs.rpi.edu Subject: security concerns with /dev/perfmon Date: Mon, 22 Mar 1999 14:14:41 -0500 From: "David E. Cross" Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Is it "safe" to give permissions to ordinary users to access "/dev/perfmon"? If yes, what level of access? does the driver distinguish between r/w access with the get/set IOCTLS? I noticed there are some entries listed in /usr/include/machine/perfmon.h that are listed as dangerous or not to use, can those be filtered out? -- David Cross To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message