User: Password:
|
|
Subscribe / Log in / New account

Tainting from user space

Tainting from user space

Posted May 25, 2006 10:35 UTC (Thu) by remijnj (guest, #5838)
In reply to: Tainting from user space by ncm
Parent article: Tainting from user space

I think tainting is a one-way street and that a kernel can't be untainted. The article doesn't mention that writing '0' to the sysfs file untaints it.


(Log in to post comments)

Tainting from user space

Posted May 25, 2006 11:40 UTC (Thu) by schabi (guest, #14079) [Link]

But given access to the whole _physical_ memory allows one to reset the taint flag.

Tainting from user space

Posted May 25, 2006 12:52 UTC (Thu) by remijnj (guest, #5838) [Link]

Hmmm, didn't think of that. You are ofcourse correct. If a user space process has access to physical memory all bets are off.


Copyright © 2018, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds