NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: kern/16300 (unprivileged PCI config space access considered harmful)



The following reply was made to PR kern/16300; it has been noted by GNATS.

From: David Holland <dholland-bugs%netbsd.org@localhost>
To: gnats-bugs%NetBSD.org@localhost
Cc: 
Subject: Re: kern/16300 (unprivileged PCI config space access considered
 harmful)
Date: Mon, 11 Oct 2010 01:55:15 +0000

 On Sun, Oct 10, 2010 at 04:20:03PM +0000, Klaus Klein wrote:
  >  Sure, since that's option 1) as suggested in the report.  However,
  >  I still stand by the reservation I had back then. :-)
  >  
  >  Anyway, if you think this resolves the issue satisfactorily, feel
  >  free to close.
 
 What unprivileged processes expect to be able to root around in PCI
 configuration space? The only candidate I can think of offhand is the
 X server, and that's more of a bug/historical weakness than anything
 else...
 
 -- 
 David A. Holland
 dholland%netbsd.org@localhost
 


Home | Main Index | Thread Index | Old Index