Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 7 Jul 1998 07:08:43 +0000 (GMT)
From:      Terry Lambert <tlambert@primenet.com>
To:        jkh@time.cdrom.com (Jordan K. Hubbard)
Cc:        joelh@gnu.org, smoergrd@oslo.geco-prakla.slb.com, tarkhil@asteroid.svib.ru, current@FreeBSD.ORG
Subject:   Re: xf86OpenConsole: KDENABIO failed (Operation not permitted)
Message-ID:  <199807070708.AAA03942@usr06.primenet.com>
In-Reply-To: <26015.899757973@time.cdrom.com> from "Jordan K. Hubbard" at Jul 6, 98 01:46:13 pm

next in thread | previous in thread | raw e-mail | index | archive | help

> > Most things that are disallowed under securelevel 1 are things that
> > aren't frequently done except during rc, a system install, or an
> > attack.  But running X is a normal operation.  I'd classify it as a
> > bug myself.
> 
> Actually, running X is not a "normal" operation at all - it performs
> inb/outb instructions and does various privileged bits of syscons
> frobbing that could be potentially quite hazardous in the hands of the
> deliberately malicious.  Running an X server should be a conscious
> compromise of certain types of security.

You wouldn't classify this as an architectural design bug in the
granularity of FreeBSD's control over the I/O address space?

Or in FreeBSD's console driver code leaving the X server no choice
to obtain access to the display in bitmap mode?

Admittedly, requiring user accessiblity to I/O space to get hardware
to do something is wrong, but the requirement is because of FreeBSD
not abstracting that access via a user<->kernel interface, not an
inherent problem with the hardware.

					Terry Lambert
					terry@lambert.org
---
Any opinions in this posting are my own and not those of my present
or previous employers.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199807070708.AAA03942>