Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 9 Sep 2010 16:54:57 +0200
From:      Kurt Jaeger <pi@opsec.eu>
To:        Gareth de Vaux <bsd@lordcow.org>
Cc:        stable@freebsd.org
Subject:   Re: MSIX failure
Message-ID:  <20100909145457.GH34314@home.opsec.eu>
In-Reply-To: <20100909143357.GG34314@home.opsec.eu>
References:  <20100908094050.GA73841@lordcow.org> <AANLkTikvd09fw3fUhxsXDhMoWE-kvMoPjXPSTfzYY73T@mail.gmail.com> <20100909125400.GA18723@lordcow.org> <20100909131340.GA75829@icarus.home.lan> <20100909132519.GB21535@lordcow.org> <20100909140224.GA76889@icarus.home.lan> <20100909142226.GA25370@lordcow.org> <20100909142455.GA77677@icarus.home.lan> <20100909142928.GA25877@lordcow.org> <20100909143357.GG34314@home.opsec.eu>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi!

> > > Is this within a jail or something else along those lines?  I can't
> > > reproduce the problem otherwise.  Frustrating!  Someone else on the list
> > > might have ideas as to what could cause this.
> > 
> > Nope, this's a normal host. I've got securelevel on 1, but doubt that
> > would affect this?
> 
> I assume it affects it.
> 
> http://www.freebsd.org/doc/en/books/faq/security.html#SECURELEVEL
> 
> Basically, when the securelevel is positive, the kernel restricts
> certain tasks; not even the superuser (i.e., root) is allowed to
> do them.
> 
> There:
> 
> # Write to kernel memory via /dev/mem and /dev/kmem.
> 
> So I assume it also restricts reading /dev/kmem ?

-c asks for pci device capabilities, which are read in

/usr/src/usr.sbin/pciconf/pciconf.c:177 with O_RDWR

I guess that's it.

-- 
pi@opsec.eu            +49 171 3101372                        10 years to go !



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20100909145457.GH34314>