On 10/27/2010 06:54 PM, Rajat Sharma wrote: > In any case, no one can claim its not security hole, it is definitely, > but only restricted to privileged processes. Any of the vulnerable > process can make life easy for hackers. Also no one can build 100% > secure system. This is non-sense. It is a feature. I need it when working on my ARM based system and trying to debug some hardware that needs writing to specific memory locations. If you want to call this a security hole then I think you should consider how the balance between usability and security works. If a system needs to be 100% secure it should be powered off, with cables physically removed from any power outlet and stored in the vault of the federal reserve or somesuch. Here is a message about restricting the access through /dev/mem on x86, check your kernel config to see how well protected you are: http://lwn.net/Articles/267427/ But here I am claiming that it is a feature not a security hole. ;-) Wouter -- To unsubscribe from this list: send an email with "unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx Please read the FAQ at http://kernelnewbies.org/FAQ