[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: kern/37986: any user can hog the all cpu with _sched_setparam.
The following reply was made to PR kern/37986; it has been noted by GNATS.
From: Elad Efrat <elad%NetBSD.org@localhost>
To: "Mindaugas R." <rmind%NetBSD.org@localhost>
Cc: yamt%mwd.biglobe.ne.jp@localhost, gnats-bugs%NetBSD.org@localhost
Subject: Re: kern/37986: any user can hog the all cpu with _sched_setparam.
Date: Sun, 10 Feb 2008 15:33:17 +0200
Mindaugas R. wrote:
>> any user can hog the all cpu with _sched_setparam.
>> - pass neccessary info to kauth_authorize_foo.
> What is not passed?
>> - add appropriate checks in secmodel/.
> Originally, sched_setparam was superuser-only call. It looks like Elad has
> changed this behaviour in the 1.46 revision of secmodel_bsd44_suser.c .
Look at the compat code. I'm working on this.
Main Index |
Thread Index |