Greg KH wrote: > On Thu, Nov 01, 2007 at 10:42:02AM -0500, Tan, Lin wrote: > >> Thank you so much for the response. :) >> >> I think a malicious driver (in kernel space) can still call these >> functions to create a device node, which is dangerous. If this is not >> possible, then there is no security hole. >> > I don't see how this is possible, do you? > > Remember, if you have a malicious driver in kernel space, you can do > whatever you want to do, no need to try to plod through the symbol table > to lookup a static symbol in a kernel module and call that, just create > the device node yourself with your own code :) > For this reason, the LSM design explicitly disclaims any attempt to defend against malicious in-kernel threats. If you can run arbitrary code inside the Linux kernel, the game is over, period. To do better requires a microkernel design, and Linux will not go there.
Crispin -- Crispin Cowan, Ph.D. http://crispincowan.com/~crispin CEO, Mercenary Linux http://mercenarylinux.com/ Itanium. Vista. GPLv3. Complexity at work - To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html