From owner-freebsd-security  Tue Jul 13 12: 3:39 1999
Delivered-To: freebsd-security@freebsd.org
Received: from alice.gba.oz.au (gba-254.tmx.com.au [203.9.155.254])
	by hub.freebsd.org (Postfix) with SMTP id 5637114ED7
	for <security@FreeBSD.ORG>; Tue, 13 Jul 1999 12:03:33 -0700 (PDT)
	(envelope-from gjb-freebsd@gba.oz.au)
Received: (qmail 5759 invoked by uid 1001); 13 Jul 1999 22:25:20 +1000
Message-ID: <19990713122520.5758.qmail@alice.gba.oz.au>
X-Posted-By: GBA-Post 1.03 20-Sep-1998
X-PGP-Fingerprint: 5A91 6942 8CEA 9DAB B95B  C249 1CE1 493B 2B5A CE30
Date: Tue, 13 Jul 1999 22:25:20 +1000
From: Greg Black <gjb-freebsd@gba.oz.au>
To: Robert Watson <robert+freebsd@cyrus.watson.org>
Cc: Garrett Wollman <wollman@khavrinen.lcs.mit.edu>,
	Darren Reed <avalon@coombs.anu.edu.au>, security@FreeBSD.ORG
Subject: Re: Module magic 
References: <Pine.BSF.3.96.990713062706.14450C-100000@fledge.watson.org> 
In-reply-to: <Pine.BSF.3.96.990713062706.14450C-100000@fledge.watson.org> 
    of Tue, 13 Jul 1999 06:34:49 -0400
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
X-Loop: FreeBSD.org

Robert Watson writes:

> > > > FWIW, I believe NetBSD systems (and OpenBSD systems) ship configured to
> > > > boot with securelevel == 0, as opposed to FreeBSD which appears to default
> > > > to -1.
> > > 
> > > We think our users are more concerned about X working.
> > 
> > Are you saying that X does not work when securelevel >= 0 under
> > FreeBSD?
> 
> If I recall, the XiG Accelerated X product requires direct access to
> memory.  vm_mmap.c:
> 
> [...]
> 
> Their code should probably not do this, as direct memory access violates
> kernel safety.

Can anybody tell me if this breakage only applies to XiG's
Accelerated X or if it is also an issue with XFree86?

-- 
Greg Black -- <gjb@acm.org>



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message