Arjan van de Ven wrote: > seriously; exposing kernel address space to userland is not good, root > or not. And we go through relatively great length to make sure we don't > do that in any default config.
There also is /proc/kcore readable by root in the default config. So the full memory is already exposed to user space if you are root. We want to make sure to have the same access protection here as kcore? ------------------------------------------------------------------------- This SF.Net email is sponsored by the Moblin Your Move Developer's challenge Build the coolest Linux based applications with Moblin SDK & win great prizes Grand prize is a trip for two to an Open Source event anywhere in the world http://moblin-contest.org/redirect.php?banner_id=100&url=/ _______________________________________________ Ltp-list mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/ltp-list
