NetBSD-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: kern/16300 (unprivileged PCI config space access considered harmful)
The following reply was made to PR kern/16300; it has been noted by GNATS.
From: David Holland <dholland-bugs%netbsd.org@localhost>
To: gnats-bugs%NetBSD.org@localhost
Cc:
Subject: Re: kern/16300 (unprivileged PCI config space access considered
harmful)
Date: Mon, 11 Oct 2010 01:55:15 +0000
On Sun, Oct 10, 2010 at 04:20:03PM +0000, Klaus Klein wrote:
> Sure, since that's option 1) as suggested in the report. However,
> I still stand by the reservation I had back then. :-)
>
> Anyway, if you think this resolves the issue satisfactorily, feel
> free to close.
What unprivileged processes expect to be able to root around in PCI
configuration space? The only candidate I can think of offhand is the
X server, and that's more of a bug/historical weakness than anything
else...
--
David A. Holland
dholland%netbsd.org@localhost
Home |
Main Index |
Thread Index |
Old Index