Date: Tue, 7 Jul 1998 00:40:48 -0500 (CDT) From: Joel Ray Holveck <joelh@gnu.org> To: jkh@time.cdrom.com Cc: smoergrd@oslo.geco-prakla.slb.com, tarkhil@asteroid.svib.ru, current@FreeBSD.ORG Subject: Re: xf86OpenConsole: KDENABIO failed (Operation not permitted) Message-ID: <199807070540.AAA10832@detlev.UUCP> In-Reply-To: <27600.899788666@time.cdrom.com> (jkh@time.cdrom.com) References: <27600.899788666@time.cdrom.com>
next in thread | previous in thread | raw e-mail | index | archive | help
>> While I will agree that it does not run in a normal manner, it is not >> an infrequent operation. > Erm, fine. So come up with an access method for X that doesn't > require this kind of security bypassing and I'm sure that everyone > will be quite pleased with you. :-) The implementation has been left as an exercise to the reader. Seriously, I didn't say it was something that should be fixed. In fact, I seem to recall saying that it's not worth fixing. I realize what is required to produce graphics on the PC, and that the security features of the architecture are laughable. I simply saw an email from somebody who was asking if this is a bug or a feature, and I gave my opinion. Now, will everybody please quit telling me why it exists, or why a fix is nontrivial? (If anybody thinks that not being able to run X when securelevel > 1 is the Right Thing, I would be happy to continue discussion.) Happy hacking, joelh -- Joel Ray Holveck - joelh@gnu.org - http://www.wp.com/piquan Fourth law of programming: Anything that can go wrong wi sendmail: segmentation violation - core dumped To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199807070540.AAA10832>