Andrey Konovalov daga Google
Lockdown yana ƙuntata tushen mai amfani zuwa kernel kuma yana toshe hanyoyin UEFI Secure Boot bypass. Misali, a cikin yanayin kullewa, samun dama ga / dev/mem, / dev/kmem, / dev/port, /proc/kcore, debugfs, yanayin debugging kprobes, mmiotrace, tracefs, BPF, PCMCIA CIS (Tsarin Bayanan Katin), wasu musaya yana iyakance ACPI da rijistar MSR na CPU, an katange kira zuwa kexec_file da kexec_load, an hana yin hibernation, amfani da DMA don na'urorin PCI yana iyakance, shigo da lambar ACPI daga masu canjin EFI, ba a yarda da magudi tare da tashoshin I/O , gami da canza lambar katsewa da tashar I/O don tashar tashar jiragen ruwa.
Kwanan nan an ƙara tsarin Lockdown zuwa babban kwaya na Linux
A cikin Ubuntu da Fedora, ana ba da maɓallin haɗin Alt + SysRq + X don musaki Lockdown. An fahimci cewa haɗin Alt + SysRq+X za a iya amfani da shi ne kawai tare da samun damar shiga na'urar, kuma a yanayin yin kutse daga nesa da samun tushen tushen, maharin ba zai iya kashe Lockdown ba kuma, misali, loda a. module tare da rootkit wanda ba'a sanya hannu ta lambobi cikin kernel ba.
Andrey Konovalov ya nuna cewa hanyoyin tushen madannai don tabbatar da kasancewar mai amfani ba su da tasiri. Hanya mafi sauƙi don kashe Lockdown shine software
Hanya ta farko ta ƙunshi yin amfani da ƙirar "sysrq-trigger" - don daidaita shi, kawai kunna wannan haɗin ta hanyar rubuta "1" zuwa /proc/sys/kernel/sysrq, sannan a rubuta "x" zuwa /proc/sysrq-trigger. Ya ce loophole
Hanya ta biyu ta ƙunshi kwaikwayi madannai ta hanyar
source: budenet.ru