Tainting from user space
Tainting from user space
Posted May 25, 2006 10:35 UTC (Thu) by remijnj (guest, #5838)In reply to: Tainting from user space by ncm
Parent article: Tainting from user space
I think tainting is a one-way street and that a kernel can't be untainted. The article doesn't mention that writing '0' to the sysfs file untaints it.
Tainting from user space
Posted May 25, 2006 11:40 UTC (Thu)
by schabi (guest, #14079)
[Link] (1 responses)
But given access to the whole _physical_ memory allows one to reset the taint flag.Posted May 25, 2006 11:40 UTC (Thu) by schabi (guest, #14079) [Link] (1 responses)
Tainting from user space
Posted May 25, 2006 12:52 UTC (Thu)
by remijnj (guest, #5838)
[Link]
Hmmm, didn't think of that. You are ofcourse correct. If a user space process has access to physical memory all bets are off. Posted May 25, 2006 12:52 UTC (Thu) by remijnj (guest, #5838) [Link]