From owner-freebsd-hackers Fri Oct 6 19:08:55 1995 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.6.12/8.6.6) id TAA03435 for hackers-outgoing; Fri, 6 Oct 1995 19:08:55 -0700 Received: from ccslinux.dlsu.edu.ph (root@linux1.dlsu.edu.ph [165.220.8.15]) by freefall.freebsd.org (8.6.12/8.6.6) with SMTP id TAA03379 for ; Fri, 6 Oct 1995 19:08:14 -0700 Received: by ccslinux.dlsu.edu.ph (Linux Smail3.1.28.1 #13) Sender: owner-hackers@FreeBSD.org Precedence: bulk id m0t1OXJ-000A7OC; Sat, 7 Oct 95 09:58 GMT+0800 Sender: humprey@linux1.dlsu.edu.ph (Humprey Sy) Date: Sat, 7 Oct 1995 09:58:49 +48000 From: "Humprey C. Sy" Sender: "Humprey C. Sy" Reply-To: "Humprey C. Sy" Subject: Accessing another process's virtual address space To: hackers@FreeBSD.org Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; CHARSET=US-ASCII Does FreeBSD allow a process to read or access the virtual address space of another process? Or if the kernel provides a service that does that? Or does FreeBSD provide a protection mechanism for this? - Humprey -