Subject: Re: writing secure kernel modules
To: None <tech-kern@netbsd.org>
From: None <xs@kittenz.org>
List: tech-kern
Date: 03/22/2002 16:30:43
on Fri, Mar 22, 2002 at 02:11:07PM +0100, Piotr Stolc wrote:
> Hi all!
> I just wrote simple kernel module which restricts the ability to view
> process table by users (like "restricted proc" option in Openwall patch for
> Linux). It can be found at:
> http://sedez.iq.pl/~socrtp/netbsd/resproc-0.01beta.tar.gz

Cool. I did something similar a while ago. I filed it as a PR at:
http://www.netbsd.org/cgi-bin/query-pr-single.pl?number=14282

Doesn't "w" misreport stale utmp entries?
I think both my patch and your module fail when procfs is used and also when
kern.proc* isn't used (eg, direct kmem accesses, yuck.)