From owner-freebsd-security Fri Nov 9 5:23:57 2001 Delivered-To: freebsd-security@freebsd.org Received: from shikima.mine.nu (pc1-card3-0-cust77.cdf.cable.ntl.com [62.252.49.77]) by hub.freebsd.org (Postfix) with ESMTP id E259A37B428 for ; Fri, 9 Nov 2001 05:23:51 -0800 (PST) Received: from rasputin by shikima.mine.nu with local (Exim 3.33 #1) id 162BeN-0001c5-00; Fri, 09 Nov 2001 13:24:51 +0000 Date: Fri, 9 Nov 2001 13:24:51 +0000 From: Rasputin To: Anthony Atkielski Cc: security@freebsd.org Subject: Re: FreeBSD and i386 VM hardware Message-ID: <20011109132451.A6163@shikima.mine.nu> Reply-To: Rasputin References: <01b301c16918$be1763a0$0a00000a@atkielski.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: <01b301c16918$be1763a0$0a00000a@atkielski.com>; from anthony@atkielski.com on Fri, Nov 09, 2001 at 01:19:06PM +0100 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org * Anthony Atkielski [011109 12:25]: > To what extent does FreeBSD actually use all the fancy virtual-memory features > of latter-day i386 processors? As I recall (it has been several years since I > looked into it), the Intel microprocessors provide some very elaborate features > for management of virtual memory, I/O operations, and security, allowing total > hardware isolation of untrusted processes. How much of this is used by FreeBSD? > I know that UNIX is supposed to isolate users from each other, but how much of > this is done in hardware, and how much of it is simulated in software? Very > tight security usually requires a lot of interdependency between the hardware > and the OS, and since UNIX is supposed to be a multiplatform OS, I'm wondering > how much hardware support for security is actually used by the system. Not much of a hardware guy myself, but I think (from the Daemon Book) most of the UNIX model works via the ability of the kernel to use protected mode features of the CPU, while limiting access to them through system calls to userland (i.e. non-privileged CPU instruction-based) processes. Hence the need for i386 CPUs or higher. Other than that, most of the isolation of processes from each other is based on context switching and (software-based) process structures. I'm sure I read that about 97% of the BSD source tree was platform-independant, the rest being things like MMU hardware-specific code. Any corrections/clarifications to the above are welcome.. -- Rasputin :: Jack of All Trades - Master of Nuns :: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message