How secure is this, like can I access arbitrary memory regions as root. Memory can be accessed from other means than /dev/mem or /dev/kmem.
An example of this is rebooting the machine. Afaik it can be done by simply altering a byte in memory.
can you be more specific as to what methods (and the context in which they're to be used) you're talking about?cmouse wrote:Either my question is trivial or wrongly put but I would still appreciate a comment from f.ex. splender to proof that since /dev/?mem is not the only way into machine's memory, that the security exists. There are several different methods which could be used to point into kernel / device memory regions. Is there anything to stop these other ways such as directly accessing the memory or other ways? If my question is trivial or somehow stupid please let me know as well.
cmouse wrote:1. Just point it to ptr and attempt to read since root has access to all memory. Perhaps you can even write to it then?