08-07-2007
On HP-UX, the closest thing that I could find to a kernel privilege is the setprivgrp command. You can lookup the man page of that command for more information.
10 More Discussions You Might Find Interesting
1. Programming
Hi all,
I am trying to setup a program to use a device driver and am confusing buffer access between User and Kernel mode. I think all applications running in User space have to communicate with the device drivers using io control calls and then have some functions called back from the driver... (1 Reply)
Discussion started by: Brendan Kennedy
1 Replies
2. HP-UX
Hi,
Please any one can help me to know that how we can restrict a user group to access the kernel at all. (0 Replies)
Discussion started by: harishankar
0 Replies
3. Programming
Hi,
I'm currently working on a project to help the analysis of malware from inside the kernel to avoid any kind of detection.
So I need to be able to read the process memory from my kernel module.
As of now, I'm stuck at converting a virtual memory address (for example 0x080483e8 found... (3 Replies)
Discussion started by: anonymoose
3 Replies
4. UNIX for Advanced & Expert Users
Can kernel process access user address space ? (2 Replies)
Discussion started by: subhotech
2 Replies
5. UNIX for Dummies Questions & Answers
hi all,
i want to know y kernel is giving access for multiple users to access a file when one user may be the owner is executing that file. Because other user can manipulate that file when the other user is executing that file, it will give the unexpected result to owner . plz help me... (1 Reply)
Discussion started by: jimmyuk
1 Replies
6. Solaris
Hi gurus
Could anybody tell me which file is read by kernel to set its default system kernal parameters values in solaris. Here I am not taking about /etc/system file which is used to load kernal modules or to change any default system kernal parameter value
Is it /dev/kmem file or something... (1 Reply)
Discussion started by: girish.batra
1 Replies
7. UNIX for Advanced & Expert Users
When accessing a user mode buffers from kernel space drivers what precautions must we take and how those precautions need to be implemented? (0 Replies)
Discussion started by: rupeshkp728
0 Replies
8. Linux
Hi everyone,
I am trying to prevent the ehci_hcd kernel module to load at boot time.
Here's what I've tried so far:
1) Add the following line to /etc/modprobe.d/blacklist.conf (as suggested here):
2) Blacklisted the module by adding the following string to
3) Tried to blacklist the module... (0 Replies)
Discussion started by: gacanepa
0 Replies
9. UNIX for Advanced & Expert Users
I would like to keep my /etc/sudoers file as distributed and only use a /etc/sudoers.d drop-in file instead.
Everything is working fine except for permissions given to the wheel group in the distribution sudoers file:
## Allows people in group wheel to run all commands
%wheel ALL=(ALL) ... (1 Reply)
Discussion started by: Chubler_XL
1 Replies
10. Forum Support Area for Unregistered Users & Account Problems
My username is abhilashnair. I was banned recently for deleting my post. I wish to apologise for disregarding forum rules. I request you to revoke my ban and give me one more chance if possible, i assure you that I will abide by all rules henceforth
Since this is really informative forum and rich... (3 Replies)
Discussion started by: Unregistered
3 Replies
LEARN ABOUT HPUX
mlockall
mlockall(2) System Calls Manual mlockall(2)
NAME
mlockall() - lock a process virtual address space in memory
SYNOPSIS
DESCRIPTION
The system call allows the calling process to lock its entire virtual address space into memory, making it immune to all routine swapping.
flags may be one or both of the following:
Lock the current process virtual address space.
All addressable pages of the address space are locked.
Lock any future additions to the process virtual address space.
Note that does not imply
or can be used to unlock all or a portion of the address space locked with A single call to removes all locks from the process virtual
address space. An call results in only the specified pages being unlocked.
Regardless of how many times a process locks a page, a single or will unlock it.
When memory is shared by multiple processes and mlocks are applied to the same physical page by multiple processes, a page remains locked
until the last lock is removed from that page.
Locks and applied with are not inherited by a child process.
The user must have the privilege.
Although and the family of functions may be used together in an application, each may affect the other in unexpected ways. This practice
is not recommended.
Security Restrictions
Some or all of the actions associated with this system call require the privilege. Processes owned by the superuser have this privilege.
Processes owned by other users may have this privilege, depending on system configuration. See privileges(5) for more information about
privileged access on systems that support fine-grained privileges.
RETURN VALUE
returns the following values:
Successful completion.
Failure.
The requested operation is not performed. is set to indicate the error.
ERRORS
If fails, is set to one of the following values:
The flags field did not contain either and/or
There is not enough lockable memory in the system
to satisfy the locking request.
The user does not have the
privilege.
EXAMPLES
The following call to locks the entire process virtual address space in memory and ensures that any future additions to the address space
will also be locked in memory:
SEE ALSO
setprivgrp(1M), getprivgrp(2), mlock(2), munlock(2), munlockall(2), plock(2), privileges(5).
STANDARDS CONFORMANCE
mlockall(2)