I must be missing something here... if you really want to attack the
kernel you are running in you could always take the address of
get_securelevel(), follow it to see where the "mov" reads from, and then
write to that location.
Protecting the kernel against each module would cause a lot of unnecessary
overhead. Is there any good reason why modules should not be "trusted"
code?
Kai