> On 2016-10-21, Kapetanakis Giannis <[email protected]> wrote:
> > Hi,
> >
> > # dmidecode 
> > # dmidecode 3.0
> > Scanning /dev/mem for entry point.
> > /dev/mem: Operation not permitted
> >
> > I guess this is similar to 
> > http://marc.info/?l=openbsd-misc&m=147575799412450&w=2
> >
> > where stu@ said:
> > "Kernel virtual memory access is no longer permitted by the kernel on a
> > normally running system.  The relevant parts of net-snmp will need to be
> > disabled or rewritten"
> 
> sthen@ != stu@
> 
> > Any way to get through that and read DMI entries?
> 
> There is a sysctl kern.allowkmem:
> 
>    KERN_ALLOWKMEM
>            Allow userland processes access to /dev/kmem.  When running with a
>            securelevel(7) greater than 0, this variable may not be changed.
> 

For the simple reason that this is 2016 not 1986, and userland code that
can sniff through the kernel's physical address space is a ridiculous
process.  It needs to die; or have proper device driver interface that
gives it exactly what it needs.

Reply via email to