Quote:
Originally Posted by jaypas
How would I demonstrate that memory resources allocated to one user or process are protected from access by another user or process?
|
1) That (and your similar threads) sounds like homework. Don't ask us to do your homework.
2) It also sounds like the typical "prove a negative" problem. I know "demonstrate" is less than "prove", but how much less? You can't prove that there isn't a hole in Linux security. You could look for a hole and fail to find it, but that doesn't prove it isn't there.
No experiment should even be considered a demonstration of such protection. A detailed code review of the relevant parts of the Linux source code could be considered a demonstration of that protection. But I assume you are not looking for a project anywhere near that difficult.