Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Sun, 19 Nov 2000 20:49:57 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Sun, 19 Nov 2000 20:49:48 -0500 Received: from imladris.demon.co.uk ([193.237.130.41]:6148 "EHLO imladris.demon.co.uk") by vger.kernel.org with ESMTP id ; Sun, 19 Nov 2000 20:49:40 -0500 Date: Mon, 20 Nov 2000 01:16:23 +0000 (GMT) From: David Woodhouse To: Dan Hollis cc: Christer Weinigel , Subject: Re: BTTV detection broken in 2.4.0-test11-pre5 In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 19 Nov 2000, Dan Hollis wrote: > Writeprotect the flashbios with the motherboard jumper, and remove the > cmos battery. > > Checkmate. :-) Only if you run your kernel XIP from the flash. If you load it into RAM, it's still possible for an attacker to modify it. You can load new code into the kernel even if the kernel doesn't make it easy for you by having CONFIG_MODULES defined. -- dwmw2 - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org Please read the FAQ at http://www.tux.org/lkml/