One should be able to do that. Of course, modprobe & co will then
have to reside in the trusted core, since they're effectively running
with kernel permissions (from a trust perspective, not a bug
perspective.)
Since modprobe needs to be able to install kernel code, there aren't
any permissions it *doesn't* have anyway...
-hpa
-- "The user's computer downloads the ActiveX code and simulates a 'Blue Screen' crash, a generally benign event most users are familiar with and that would not necessarily arouse suspicions." -- Security exploit description on http://www.zks.net/p3/how.asp- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/