Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 15 Jul 1998 18:07:48 -0500 (CDT)
From:      Joel Ray Holveck <joelh@gnu.org>
To:        luoqi@watermarkgroup.com
Cc:        matthew@wolfepub.com, hackers@FreeBSD.ORG
Subject:   Re: Protecting data in memory
Message-ID:  <199807152307.SAA15384@detlev.UUCP>
In-Reply-To: <199807152155.RAA07159@lor.watermarkgroup.com> (message from Luoqi Chen on Wed, 15 Jul 1998 17:55:54 -0400 (EDT))
References:   <199807152155.RAA07159@lor.watermarkgroup.com>

next in thread | previous in thread | raw e-mail | index | archive | help
>>> Is there any way to protect a programs memory space from all users, even
>>> root?
>> No.  root always has access to all memory space.  Consider: If it were
>> otherwise, root could just patch the kernel and gain whatever access
>> was needed.
> Actually, if you raise the securelevel to 1 or above, not even root can
> access kernel memory space (see init(8)).

Er, according to init(8), then root cannot *write* to kernel memory.

I am basically familiar with securelevel.  I oversimplified my
example.

Best,
joelh

-- 
Joel Ray Holveck - joelh@gnu.org - http://www.wp.com/piquan
   Fourth law of programming:
   Anything that can go wrong wi
sendmail: segmentation violation - core dumped

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199807152307.SAA15384>