Hi Jonathan, On Wed, Oct 27, 2010 at 1:00 PM, Jonathan Neuschäfer: > On Wed, Oct 27, 2010 at 03:40:29PM -0400, John Mahoney wrote: >> --snip-- >> >> > 1. no system can be 100% secure, but we can try to be closure. >> > 2. Writting a rootkit in kernel space could be 100 times harder compared to >> > security attacks in user space for cases like where you can assess complete >> > memory map. >> > >> > I think I am making my point more cleare now. >> > >> > >> Basically, this boils down to the ancient debate of microkernel vs >> monolithic kernel. In Linux all memory is accessible by root regardless of >> /dev/mem. >> >> -- >> John > Via simple pointers? Yes - provided it hasn't been swapped out. There are a few exceptions for a few processors with segmented memory and other funky stuff, but generally, all of the memory is accessible from kernel space by the use of a simple pointer. -- Dave Hylands Shuswap, BC, Canada http://www.DaveHylands.com/ -- To unsubscribe from this list: send an email with "unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx Please read the FAQ at http://kernelnewbies.org/FAQ