Page Menu
Home
FreeBSD
Search
Configure Global Search
Log In
Files
F144383849
D54324.diff
No One
Temporary
Actions
View File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Flag For Later
Award Token
Size
903 B
Referenced Files
None
Subscribers
None
D54324.diff
View Options
diff --git a/sys/kern/kern_kexec.c b/sys/kern/kern_kexec.c
--- a/sys/kern/kern_kexec.c
+++ b/sys/kern/kern_kexec.c
@@ -342,7 +342,19 @@
{
int error;
- // FIXME: Do w need a better privilege check than PRIV_REBOOT here?
+/*
+ * XXX: Is PRIV_REBOOT sufficient here?
+ *
+ * Loading a new kernel image via kexec_load() is a more powerful operation
+ * than a traditional reboot, as it allows replacing the running kernel
+ * without returning to firmware or the bootloader.
+ *
+ * The current use of PRIV_REBOOT relies on the system security policy
+ * (e.g., MAC frameworks, jail restrictions) to further constrain access
+ * where appropriate. A more specific privilege (e.g., kexec-specific)
+ * could provide finer-grained control in environments requiring stricter
+ * separation of administrative capabilities.
+ */
error = priv_check(td, PRIV_REBOOT);
if (error != 0)
return (error);
File Metadata
Details
Attached
Mime Type
text/plain
Expires
Mon, Feb 9, 4:15 AM (1 h, 7 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
27378020
Default Alt Text
D54324.diff (903 B)
Attached To
Mode
D54324: kern: document rationale for PRIV_REBOOT usage in kexec_load
Attached
Detach File
Event Timeline
Log In to Comment