Subject: Re: Why not track our xsrc with X11R6.6 from X.org?
To: Andrey Petrov <email@example.com>
From: Thor Lancelot Simon <firstname.lastname@example.org>
Date: 07/20/2001 10:32:50
On Fri, Jul 20, 2001 at 12:45:33AM -0700, Andrey Petrov wrote:
> On Thu, Jul 19, 2001 at 11:26:33PM -0400, Thor Lancelot Simon wrote:
> > On Thu, Jul 19, 2001 at 11:16:01AM -0700, Andrey Petrov wrote:
> > > On Thu, Jul 19, 2001 at 01:13:34AM -0400, R. C. Dowdeswell wrote:
> > > > And, to clarify that statement a little bit, there are certain memory
> > > > protections that reasonable Unices put even on root level processes, i.e.
> > > > you can't look at memory in other processes. This protection allows a
> > >
> > > What about /dev/(k)mem, procfs, ptrace?
> > See the discussion of securelevel in the init manual page. And if you
> > think of a clever way around the protections described there, please let
> > me know; I will fix it, as we have several times in the past (the first
> > and most memorable of these "oops! I guess someone forgot about..." was
> > being able to ptrace process 1 :-) ).
> I think I meant to say there are no certain memory protection that
> reasonable Unices put even on root. At least today.
Well, that's just wrong.