Capability lists are usually kept within the address space of the user. How does the system ensure that the user cannot modify the contents of the list?
Answer:
A capability list is considered a “protected object” and is accessed only indirectly by the user. The operating system ensures the user cannot access the capability list directly.