Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 2 Dec 2000 13:43:18 -0800 (PST)
From:      Matthew Jacob <mjacob@feral.com>
To:        Andrew Gallatin <gallatin@cs.duke.edu>
Cc:        "Kenneth D. Merry" <ken@kdm.org>, hackers@FreeBSD.ORG, stable@FreeBSD.ORG
Subject:   Re: PCIOCGETCONF/PCIOCREAD requires write permission?
Message-ID:  <Pine.LNX.4.21.0012021342100.5019-100000@zeppo.feral.com>
In-Reply-To: <14889.27531.660040.955219@grasshopper.cs.duke.edu>

next in thread | previous in thread | raw e-mail | index | archive | help

Agreed. Thanks for spotting this, Andrew.

No, we should not let users read PCI registers in such a fashion that will
cauase the system to crash.

> 
> Kenneth D. Merry writes:
>  > As for PCIOCREAD, it only allows reading of PCI registers, so the question
>  > there is whether there are any potential security implications to allowing
>  > non-root users to read PCI registers.  If reading configuration registers
>  > caused performance degredation, for instance.
> 
> I think that you might be able to crash an alpha with an unaligned
> access trap by reading an int or short an from an unaligned offset in
> config space.  At least this used to be true..  I'd vote for leaving
> the access permissions as is. 
> 
> Drew
> 
> 
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-hackers" in the body of the message
> 



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.4.21.0012021342100.5019-100000>