TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Linux 6.11 To Allow Tightening Of /proc/[PID]/mem Access For Better Security

10 点作者 mikece10 个月前

2 条评论

Retr0id10 个月前
The commit message references a &quot;[1]&quot; and &quot;[2]&quot; but I don&#x27;t see the links anywhere. Anyone know where I can find the full message? (or maybe the author forgot to include them?)<p>Edit: they&#x27;ve been added <a href="https:&#x2F;&#x2F;lore.kernel.org&#x2F;lkml&#x2F;20240715-absprachen-siedeln-858a949e10f1@brauner&#x2F;" rel="nofollow">https:&#x2F;&#x2F;lore.kernel.org&#x2F;lkml&#x2F;20240715-absprachen-siedeln-858...</a>
josephcsible10 个月前
I wish this either exempted root, or was a sysctl that root could turn off at runtime. Boot-time-only parameters that restrict root, combined with the ongoing efforts to make the kernel command line part of what gets signed by Secure Boot and measured by the TPM, feel like more attempts at tivoization and iOS-ification of Linux.