On Thu, 20 Jul 2000, Dan Hollis wrote:
> On Thu, 20 Jul 2000, Andre Hedrick wrote:
> > The object is to protect this from happening even if you are ROOT or have
> > stolen ROOT priviledges.
> > Does this help explain the issue or should I provide a "disk2brick.c"
> > program to make the point clearer? This will vaporize a drive to the
> > replacement level. Yes you can to that today!
>
> Ok, you prevent program from sending DISKTOBRICK IOCTL as root...
>
> So disk2brick.c will just bypass the kernel API and bit-bang on the IDE
> controller directly...
If a usermode app can hit the hardware directly like that, there's
something VERY broken...
James.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Sun Jul 23 2000 - 21:00:15 EST