[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Security stuff



> GEM writes to memory on request from the caller (intout, ptsout,
> addrout). The address of this memory is user defined, and GEM does not
> check it in any way.  Thus you can use GEM to write to arbitrary
> memory regions.  The only way to make this safe is to disallow GEM
> altogether.

You could wrap the GEM/VDI and check the parameters just before the real
GEM/VDI call. GEM/VDI should be run as the same process which called
them in orden to write over its memory.

I don't really see why GEM/VDI must be run in supervisor mode... just a
few wrappers in the applications<->GEM/VDI interface and small
modifications between GEM/VDI<->Bios/hardware link...

My objective would be: Brain damaged programs must NOT crash the entire
system NEVER!.

-- 
Jesus Cea Avion                         _/_/      _/_/_/        _/_/_/
jcea@argo.es http://www.argo.es/~jcea/ _/_/    _/_/  _/_/    _/_/  _/_/
                                      _/_/    _/_/          _/_/_/_/_/
PGP Key Available at KeyServ   _/_/  _/_/    _/_/          _/_/  _/_/
"Things are not so easy"      _/_/  _/_/    _/_/  _/_/    _/_/  _/_/
"My name is Dump, Core Dump"   _/_/_/        _/_/_/      _/_/  _/_/
"El amor es poner tu felicidad en la felicidad de otro" - Leibnitz