On Sun, Aug 03, 2003 at 09:18:33PM +0200, bert hubert wrote:
> Well, I fear the runtime overhead - as it is, I suspect this patch is
> somewhat inflamatory anyhow ('tough luck you were hacked', 'you are fscked
> anyhow').
I don't worry about this on opening *mem !
> I'll whip up a dynamic patch soonish - I'm unsure about the right location,
> /proc/sys/ something?
hmmm something such as /proc/sys/kernel/secured ?
You could even implement 3 levels :
- 0 = normal
- 1 = secured, but can go back to 0. At least this stops automated scripts.
- 2 = secured and cannot go back to lower level anyhow.
Cheers,
Willy
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Thu Aug 07 2003 - 22:00:22 EST