On Wed, May 06, 2020 at 11:30:22PM +0800, Jia-Ju Bai wrote:
That's not true at all for all systems that Linux runs on.
On 2020/5/6 19:07, Greg KH wrote:
On Wed, May 06, 2020 at 06:13:01PM +0800, Jia-Ju Bai wrote:I think that each device can only access its own DMA memory, instead of any
I have never modified DMA memory in the real world, but an attacker can useIf you have control over the hardware, and can write to any DMA memory,
a malicious device to do this.
There is a video that shows how to use the Inception tool to perform DMA
attacks and login in the Windows OS without password:
https://www.youtube.com/watch?v=HDhpy7RpUjM
again, there's almost nothing a kernel can do to protect from that.
DMA memory for other hardware devices.
A feasible example is that, the attacker inserts a malicious device viaThis is a semi-well-known issue. It's been described in the past
PCI-E bus in a locked computer, when the owner of this computer leaves.
regarding thunderbolt devices, and odds are, more people will run across
it again in the future and also complain about it.
The best solution is to solve this at the bus level, preventing
different devices access to other memory areas.
And providing physical access control to systems that you care about
this type of attack for.
Again, this isn't a new thing, but the ability for us to do much about
it depends on the specific hardware control, and how we set defaults up.
If you trust a device enough to plug it in, well, you need to trust it
:)