tech-kern archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: KAUTH_PROCESS_SCHEDULER_*AFFINITY restricted to root in default secmodel?
On Mon, Aug 29, 2011 at 08:44:39AM +1000, matthew green wrote:
>
> > I've just had my first occasion to play with the processor affinity
> > code, via porting some code from linux. It was very straightforward,
> > but there's one glaring difference: linux doesn't (by default, anyway)
> > require root to use their sched_setaffinity(), while we do require root
> > (by default) for pthread_setaffinity_np().
> >
> > I don't pretend to understand the security ramifications regarding
> > processor affinity; I do wonder, however, whether it warrants requiring
> > elevated privilege (and possible exposure via other code in the process
> > which doesn't require root for normal operation) to prevent allowing
> > users to pin their own code to a particular cpu by default. Are we sure
> > we've made the right (default) tradeoff here?
> >
> > For my own use, I know I can tweak the secmodel to permit
> > KAUTH_PROCESS_SCHEDULER_SETAFFINITY . (and now I'm going to research
> > how to actually do it. :)
>
> i've found this some what annoying. IMO, we should have a a way to say
> "let normal users do this". i'm not sure sysctl is the right place, but
> maybe an overlay secmodel? on some of my machines, i don't want to have
> to be root to do this. it's annoying to have to use root to get the
> highest performance i can out of an application.
>
> the current default is fine, however.
Something analogous to our friends:
% sysctl -a | grep mount
vfs.generic.usermount = 0
security.models.suser.usermount = 0
%
perhaps?
Regards,
Alistair
Home |
Main Index |
Thread Index |
Old Index