On Thu, 20 Jul 2000, Andre Hedrick wrote:
> The object is to protect this from happening even if you are ROOT or have
> stolen ROOT priviledges.
Useless. If you have acheived root privileges you can just substitute the
ide drivers or load a module that bypasses all the checks. Now, if the
securelevel system or the capabilities system become solid enough there
will be a good reason for this patch. In fact it is necessary.
At the moment it is not a problem though. As root you can reflash the disk
through some use of ioremap. You can even reflash the bios. Perhaps
someone can even figure out a way to abuse the microcode updates of an
Intel chip to fry the cpu.
At the moment I don't think it is a very high priority. It is a
preparation for the future but i suspect there are more pressing problems.
Peter
-- Peter Svensson ! Pgp key available by finger, fingerprint: <petersv@psv.nu> ! 8A E9 20 98 C1 FF 43 E3 07 FD B9 0A 80 72 70 AF <petersv@df.lth.se> ! ------------------------------------------------------------------------ Remember, Luke, your source will be with you... always...- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Sun Jul 23 2000 - 21:00:14 EST