On Fri, Oct 21, 2016 at 11:56 AM, Theo de Raadt <[email protected]> wrote: > For the simple reason that this is 2016 not 1986, and userland code that > can sniff through the kernel's physical address space is a ridiculous > process. It needs to die; or have proper device driver interface that > gives it exactly what it needs.
And if anyone is wondering why and has not been a part of the discussions, here's an illustration of the issue: http://arstechnica.com/security/2016/10/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing/ (That said, if you do not see this message because of that url and filtering, ... there will be nothing I am going to do about that.) -- Raul

