From owner-freebsd-current@FreeBSD.ORG Thu Jun 5 22:12:31 2008 Return-Path: Delivered-To: current@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id BFBD9106567D for ; Thu, 5 Jun 2008 22:12:31 +0000 (UTC) (envelope-from phk@critter.freebsd.dk) Received: from phk.freebsd.dk (phk.freebsd.dk [130.225.244.222]) by mx1.freebsd.org (Postfix) with ESMTP id 598788FC14 for ; Thu, 5 Jun 2008 22:12:31 +0000 (UTC) (envelope-from phk@critter.freebsd.dk) Received: from critter.freebsd.dk (unknown [192.168.61.3]) by phk.freebsd.dk (Postfix) with ESMTP id C59B7170E4; Thu, 5 Jun 2008 22:12:29 +0000 (UTC) Received: from critter.freebsd.dk (localhost [127.0.0.1]) by critter.freebsd.dk (8.14.2/8.14.2) with ESMTP id m55MCTsk010262; Thu, 5 Jun 2008 22:12:29 GMT (envelope-from phk@critter.freebsd.dk) To: Stanislav Sedov From: "Poul-Henning Kamp" In-Reply-To: Your message of "Fri, 06 Jun 2008 02:09:27 +0400." <20080606020927.8d6675e1.stas@FreeBSD.org> Date: Thu, 05 Jun 2008 22:12:29 +0000 Message-ID: <10261.1212703949@critter.freebsd.dk> Sender: phk@critter.freebsd.dk Cc: kib@FreeBSD.org, Rui Paulo , current@FreeBSD.org Subject: Re: cpuctl(formely devcpu) patch test request X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Jun 2008 22:12:31 -0000 In message <20080606020927.8d6675e1.stas@FreeBSD.org>, Stanislav Sedov writes: >The updated patch is available at >http://www.springdaemons.com/stas/cpuctl.2.diff Have we fully thought though the potential for halt&catch_fire ? Would it make sense to have a more granular security model than the simple device-node access based "are you root?" test ? -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence.