Sponsored Content
Full Discussion: Revoke Kernel Access..
Top Forums UNIX for Dummies Questions & Answers Revoke Kernel Access.. Post 302130623 by blowtorch on Tuesday 7th of August 2007 05:52:30 AM
Old 08-07-2007
On HP-UX, the closest thing that I could find to a kernel privilege is the setprivgrp command. You can lookup the man page of that command for more information.
 

10 More Discussions You Might Find Interesting

1. Programming

Aplication user and kernel mode (data access)

Hi all, I am trying to setup a program to use a device driver and am confusing buffer access between User and Kernel mode. I think all applications running in User space have to communicate with the device drivers using io control calls and then have some functions called back from the driver... (1 Reply)
Discussion started by: Brendan Kennedy
1 Replies

2. HP-UX

How to restrict a user group to access the kernel

Hi, Please any one can help me to know that how we can restrict a user group to access the kernel at all. (0 Replies)
Discussion started by: harishankar
0 Replies

3. Programming

Access process memory from kernel space

Hi, I'm currently working on a project to help the analysis of malware from inside the kernel to avoid any kind of detection. So I need to be able to read the process memory from my kernel module. As of now, I'm stuck at converting a virtual memory address (for example 0x080483e8 found... (3 Replies)
Discussion started by: anonymoose
3 Replies

4. UNIX for Advanced & Expert Users

Can kernel process access user address space ?

Can kernel process access user address space ? (2 Replies)
Discussion started by: subhotech
2 Replies

5. UNIX for Dummies Questions & Answers

kernel giving access for multiple users to access files

hi all, i want to know y kernel is giving access for multiple users to access a file when one user may be the owner is executing that file. Because other user can manipulate that file when the other user is executing that file, it will give the unexpected result to owner . plz help me... (1 Reply)
Discussion started by: jimmyuk
1 Replies

6. Solaris

Which file is read by kernel to set its default system kernel parameters values?

Hi gurus Could anybody tell me which file is read by kernel to set its default system kernal parameters values in solaris. Here I am not taking about /etc/system file which is used to load kernal modules or to change any default system kernal parameter value Is it /dev/kmem file or something... (1 Reply)
Discussion started by: girish.batra
1 Replies

7. UNIX for Advanced & Expert Users

Precaution to access user mode buffers from kernel

When accessing a user mode buffers from kernel space drivers what precautions must we take and how those precautions need to be implemented? (0 Replies)
Discussion started by: rupeshkp728
0 Replies

8. Linux

Unload kernel module at boot time (Debian Wheezy 7.2, 3.2.0-4-686-pae kernel)

Hi everyone, I am trying to prevent the ehci_hcd kernel module to load at boot time. Here's what I've tried so far: 1) Add the following line to /etc/modprobe.d/blacklist.conf (as suggested here): 2) Blacklisted the module by adding the following string to 3) Tried to blacklist the module... (0 Replies)
Discussion started by: gacanepa
0 Replies

9. UNIX for Advanced & Expert Users

Sudoers - Revoke default policy

I would like to keep my /etc/sudoers file as distributed and only use a /etc/sudoers.d drop-in file instead. Everything is working fine except for permissions given to the wheel group in the distribution sudoers file: ## Allows people in group wheel to run all commands %wheel ALL=(ALL) ... (1 Reply)
Discussion started by: Chubler_XL
1 Replies

10. Forum Support Area for Unregistered Users & Account Problems

User banned, requesting to revoke the ban.

My username is abhilashnair. I was banned recently for deleting my post. I wish to apologise for disregarding forum rules. I request you to revoke my ban and give me one more chance if possible, i assure you that I will abide by all rules henceforth Since this is really informative forum and rich... (3 Replies)
Discussion started by: Unregistered
3 Replies
mlockall(2)							System Calls Manual						       mlockall(2)

NAME
mlockall() - lock a process virtual address space in memory SYNOPSIS
DESCRIPTION
The system call allows the calling process to lock its entire virtual address space into memory, making it immune to all routine swapping. flags may be one or both of the following: Lock the current process virtual address space. All addressable pages of the address space are locked. Lock any future additions to the process virtual address space. Note that does not imply or can be used to unlock all or a portion of the address space locked with A single call to removes all locks from the process virtual address space. An call results in only the specified pages being unlocked. Regardless of how many times a process locks a page, a single or will unlock it. When memory is shared by multiple processes and mlocks are applied to the same physical page by multiple processes, a page remains locked until the last lock is removed from that page. Locks and applied with are not inherited by a child process. The user must have the privilege. Although and the family of functions may be used together in an application, each may affect the other in unexpected ways. This practice is not recommended. Security Restrictions Some or all of the actions associated with this system call require the privilege. Processes owned by the superuser have this privilege. Processes owned by other users may have this privilege, depending on system configuration. See privileges(5) for more information about privileged access on systems that support fine-grained privileges. RETURN VALUE
returns the following values: Successful completion. Failure. The requested operation is not performed. is set to indicate the error. ERRORS
If fails, is set to one of the following values: The flags field did not contain either and/or There is not enough lockable memory in the system to satisfy the locking request. The user does not have the privilege. EXAMPLES
The following call to locks the entire process virtual address space in memory and ensures that any future additions to the address space will also be locked in memory: SEE ALSO
setprivgrp(1M), getprivgrp(2), mlock(2), munlock(2), munlockall(2), plock(2), privileges(5). STANDARDS CONFORMANCE
mlockall(2)
All times are GMT -4. The time now is 12:47 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy