Re: Trusted kernel patchset for Secure Boot lockdown
From: Matthew Garrett
Date: Thu Mar 13 2014 - 17:31:15 EST
On Thu, 2014-03-13 at 21:24 +0000, One Thousand Gnomes wrote:
> If I have CAP_SYS_RAWIO I can make arbitary ring 0 calls from userspace,
> trivially and in a fashion well known and documented.
How?
> You've missed a few others too - mem= (especially with exactmap) for
> example.
/dev/mem access is restricted, so what would this buy you? The potential
to have the kernel hand over a region belonging to hardware in response
to a userspace allocation?
--
Matthew Garrett <matthew.garrett@xxxxxxxxxx>
N§²æ¸yú²X¬¶ÇvØ)Þ{.nÇ·¥{±êX§¶¡Ü}©²ÆzÚj:+v¨¾«êZ+Êzf£¢·h§~Ûÿû®w¥¢¸?¨è&¢)ßfùy§m
á«a¶Úÿ0¶ìå