Tainting from user space
Posted May 25, 2006 19:46 UTC (Thu) by brouhaha
In reply to: Tainting from user space
Parent article: Tainting from user space
Exactly the same point I was going to make.
On the rare occasions when I've accessed physical memory from user space, I've done it by mmap()ing /dev/mem. Arguably any user process that mmap()s /dev/mem or /dev/kmem with write permission should result in a tainted flag, without any explicit request for that flag by the user process.
to post comments)