On  1 Jan 90 at 5:00, [EMAIL PROTECTED] wrote:

[snip]
> Magic SysRq is in "kernel hacking" section. If you enable it, and you
> are not kernel hacker, you loose. (If you are kernel hacker, you
> certainly don't want mere mortals access your console, do you?
>
> Read help entry:
>
> CONFIG_MAGIC_SYSRQ
>   If you say Y here, you will have some control over the system even
>   if the system crashes for example during kernel debugging (e.g., you
>   will be able to flush the buffer cache to disk, reboot the system
>   immediately or dump some status information). This is accomplished
>   by pressing various keys while holding SysRq (Alt+PrintScreen). The
>   keys are documented in Documentation/sysrq.txt. Don't say Y unless
>                                                   !!!!!!!!!!!!!!!!!!
>   you really know what this hack does.
>   !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
>
> If you did not realize it allows people to bypass vlock -a, you did
> not know what it does, and you should not have enabled it :-).

    CONFIG_MAGIC_SYSRQ is enabled by default in the 2.2.5 kernel which is
shipped with RedHat-6.0:

viper:/usr/src/linux-2.2.5% grep SYSRQ arch/i386/defconfig .config
arch/i386/defconfig:CONFIG_MAGIC_SYSRQ=y
.config:CONFIG_MAGIC_SYSRQ=y
viper:/usr/src/linux-2.2.5% uname -a
Linux some.inet.address 2.2.5-15 #1 Mon Apr 19 22:21:09 EDT 1999 i586 unknown

    In 2.2.5-22 kernel (the last version in updates/) arch/i386/defconfig has
CONFIG_MAGIC_SYSRQ also enabled.

   The most interesting is that standard kernel distribution
(linux-2.2.5.tar.gz) doesn't have SYSRQ enabled -- it was set to "y" by
RedHat (probably during beta-testing), and is "y" for all architectures.

    So, those who use RedHat don't even have to say "Y" and decide if they
are hackers or not -- the decision was made for them beforehand ;-).
       ___________________________________________________________________
       Dmitry Yu. Bolkhovityanov  |  Novosibirsk, RUSSIA
       phone (383-2)-39-49-56     |  The Budker Institute of Nuclear Physics
                                  |  Lab. 5-13

Reply via email to