diff options
author | Theo de Raadt <deraadt@cvs.openbsd.org> | 2016-09-25 15:23:38 +0000 |
---|---|---|
committer | Theo de Raadt <deraadt@cvs.openbsd.org> | 2016-09-25 15:23:38 +0000 |
commit | ad35585b9ffc27f529b70035fcdfe3e2d66d3993 (patch) | |
tree | 714a871bb4d04c9a62c9099e614da701fd0b639f /sys/arch/sh | |
parent | 9028f68eb5361d23438fc560643a30d93e49e4d1 (diff) |
Make a move towards ending 4 decades of kernel snooping.
Add sysctl kern.allowkmem (default 0) which controls the ability to open
/dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99%
of utilities in the tree to operate on sysctl-nodes (either by themselves
or via code hiding in the guts of -lkvm).
pstat -d and -v & procmap are affected and continued use of them will
require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's
buddy sendbug) are affected, but we'll work out a solution soon.
There will be some impact in ports.
ok kettenis guenther
Diffstat (limited to 'sys/arch/sh')
-rw-r--r-- | sys/arch/sh/sh/mem.c | 8 |
1 files changed, 6 insertions, 2 deletions
diff --git a/sys/arch/sh/sh/mem.c b/sys/arch/sh/sh/mem.c index fdbe75a5b71..596864a52ca 100644 --- a/sys/arch/sh/sh/mem.c +++ b/sys/arch/sh/sh/mem.c @@ -1,4 +1,4 @@ -/* $OpenBSD: mem.c,v 1.8 2016/08/16 18:21:54 tedu Exp $ */ +/* $OpenBSD: mem.c,v 1.9 2016/09/25 15:23:37 deraadt Exp $ */ /* $NetBSD: mem.c,v 1.21 2006/07/23 22:06:07 ad Exp $ */ /* @@ -101,16 +101,20 @@ cdev_decl(mm); int mmopen(dev_t dev, int flag, int mode, struct proc *p) { + extern int allowkmem; + switch (minor(dev)) { case 0: case 1: + if (securelevel <= 0 || allowkmem) + break; + return (EPERM); case 2: case 12: break; default: return (ENXIO); } - return (0); } |