Content-Length: 9772 | pFad | http://lwn.net/Articles/185046/

Tainting from user space [LWN.net]
|
|
Subscribe / Log in / New account

Tainting from user space

Tainting from user space

Posted May 25, 2006 10:35 UTC (Thu) by remijnj (guest, #5838)
In reply to: Tainting from user space by ncm
Parent article: Tainting from user space

I think tainting is a one-way street and that a kernel can't be untainted. The article doesn't mention that writing '0' to the sysfs file untaints it.


to post comments

Tainting from user space

Posted May 25, 2006 11:40 UTC (Thu) by schabi (guest, #14079) [Link] (1 responses)

But given access to the whole _physical_ memory allows one to reset the taint flag.

Tainting from user space

Posted May 25, 2006 12:52 UTC (Thu) by remijnj (guest, #5838) [Link]

Hmmm, didn't think of that. You are ofcourse correct. If a user space process has access to physical memory all bets are off.


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds









ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: http://lwn.net/Articles/185046/

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy