Arjan van de Ven wrote:

> seriously; exposing kernel address space to userland is not good, root
> or not. And we go through relatively great length to make sure we don't
> do that in any default config.

There also is /proc/kcore readable by root in the default config. So the full
memory is already exposed to user space if you are root. We want to make sure
to have the same access protection here as kcore?


-------------------------------------------------------------------------
This SF.Net email is sponsored by the Moblin Your Move Developer's challenge
Build the coolest Linux based applications with Moblin SDK & win great prizes
Grand prize is a trip for two to an Open Source event anywhere in the world
http://moblin-contest.org/redirect.php?banner_id=100&url=/
_______________________________________________
Ltp-list mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ltp-list

Reply via email to