On Fri, Oct 21, 2016 at 11:56 AM, Theo de Raadt <[email protected]> wrote:
> For the simple reason that this is 2016 not 1986, and userland code that
> can sniff through the kernel's physical address space is a ridiculous
> process.  It needs to die; or have proper device driver interface that
> gives it exactly what it needs.

And if anyone is wondering why and has not been a part of the
discussions, here's an illustration of the issue:

http://arstechnica.com/security/2016/10/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing/

(That said, if you do not see this message because of that url and
filtering, ... there will be nothing I am going to do about that.)

-- 
Raul

Reply via email to