Hi Jonathan,

On Wed, Oct 27, 2010 at 1:00 PM, Jonathan Neuschäfer:
> On Wed, Oct 27, 2010 at 03:40:29PM -0400, John Mahoney wrote:
>> --snip--
>>
>> > 1. no system can be 100% secure, but we can try to be closure.
>> > 2. Writting a rootkit in kernel space could be 100 times harder compared to
>> > security attacks in user space for cases like where you can assess complete
>> > memory map.
>> >
>> > I think I am making my point more cleare now.
>> >
>> >
>> Basically, this boils down to the ancient debate of microkernel vs
>> monolithic kernel.  In Linux all memory is accessible by root regardless of
>> /dev/mem.
>>
>> --
>> John
> Via simple pointers?

Yes - provided it hasn't been swapped out.

There are a few exceptions for a few processors with segmented memory
and other funky stuff, but generally, all of the memory is accessible
from kernel space by the use of a simple pointer.

-- 
Dave Hylands
Shuswap, BC, Canada
http://www.DaveHylands.com/

--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to ecar...@nl.linux.org
Please read the FAQ at http://kernelnewbies.org/FAQ

Reply via email to