Darren J Moffat wrote:
> Jan Setje-Eilers wrote:
>> Darren J Moffat wrote:
>>> Enrico Perla wrote:
>>>>
>>>> Darren J Moffat wrote:
>>>>> What is the method credential section of the SMF manifest used to
>>>>> start the vbios service ? ie what user/group id does it run as and
>>>>> what privileges(5) does it require.
>>>> It runs as root and needs to open /dev/xsvc to map the BIOS image. 
>>>> After
>>>> that, it needs to be able to do in/out assembly instruction (so,
>>>> basically, it needs to be able to set its IOPL to 3).
>>>> I haven't set so far any specific privilege on the daemon since either
>>>> /dev/xsvc or in/out look to me as a pretty good way to take over the
>>>> system, if vbiosd proves to be vulnerable.
>>>>
>>>> Actually, though, we are a bit re-designing vbiosd (there was another
>>>> service that was only responsible of checking if gdm started and
>>>> receiving SIGTHAW to catch resumes that we are merging into vbiosd in
>>>> order to have a single service). Since that will likely lead to two
>>>> different threads, maybe we want to separate the privileges there? What
>>>> would be your suggestion?
>>>
>>> I'd say in that case you aren't ready for ARC review if you don't 
>>> know what vbiosd does.
>>
>>  We do know what it does. Re-design is perhaps a stronger term than 
>> was appropriate here. Enrico was collapsing what were originally two 
>> daemons into one yesterday. He was primarily offering that he'd be 
>> happy to make additional changes if you had some smart ideas about how 
>> to deal with xsvc without running as root.
> 
> So doesn't changing two daemons into one change the architecture of this 
> case ?  Or is what is in the case the two daemons in one ?
> 

  The case reflects the single daemon. In fact combining them was driven 
by the inevitable reaction that multiple daemons would provoke.

-jan

Reply via email to