Home > Cannot Open > Cannot Open /dev/kmem

Cannot Open /dev/kmem

Since kmem provides virtual addresses it's perfect for KME, but the kernel function read_kmem() returns EPERM in all cases and mmap_kmem() doesn't work as corbet points out above. Some unscrupulous user could come along and just delete it now! Why does the size of this std::string change, when characters are changed? etc. http://optimisersonpc.com/cannot-open/cannot-open-dev-hda.html

Who needs /dev/kmem? Posted Aug 19, 2005 16:15 UTC (Fri) by giraffedata (subscriber, #1954) [Link] If no one is using something, there's no point in it being maintained I agree with that, but don't A stupid one, to be sure, because it alerted you to the problem, but I'm sure Sturgeon's Law is true of crackers too. Who needs /dev/kmem? http://unix.ittoolbox.com/groups/technical-functional/ibm-aix-l/1800106-an-error-occurred-cannot-open-devkmem-permission-denied-3806289

How do I handle this? That's what rootkits are all about, after all. I have um, ud, tems, teps all running as itmadmin:itmgroup. more imporantly, a *read only* file.

  1. Has anyone seen this?
  2. Looks similar to address of jiffies.
  3. This is the accepted answer.
  4. Homepage: https://www.beepz.com 0 Kudos Reply maria paschali Frequent Advisor Options Mark as New Bookmark Subscribe Subscribe to RSS Feed Highlight Print Email to a Friend Report Inappropriate Content ‎12-06-2001 10:09 PM
  5. Who needs /dev/kmem?
  6. Updated on 2008-01-15T14:52:45Z at 2008-01-15T14:52:45Z by jas_forsyth Show: 10 25 50 100 items per page Previous Next Feed for this topic LWN.net News from the source ContentWeekly EditionArchivesSearchKernelSecurityDistributionsEvents calendarUnread commentsLWN
  7. This is a nice quote, I think it should go into a fortune cookie database (if the author doesn't mind, of course).

Instead, just "su" to root, and then lsof. dd if=/dev/mem skip=$((0x804660c)) bs=$((0x10)) count=1 2> /dev/null | hexdump 0000000 02b9 0002 0001 0000 0000 0000 0000 0000 0000010 Try several times and see how the value is incrementing. Removing a feature like that is not in the cards for 2.6.13. All product names are trademarks of their respective companies.

If by "have it around," you mean have it present in kernel.org source trees. I.e. However, when I try to start the third oracle instance (8.0.6) I get the following error message : -"[email protected]/u03/oradata/MP30DBS $svrmgrlOracle Server Manager Release - Production(c) Copyright 1999, Oracle Corporation. http://www.unix.com/unix-for-dummies-questions-and-answers/15280-permissioning-error.html PD: Excuse my poor english.

Unanswered question This question has not been answered yet. Log In E-mail or User ID Password Keep me signed in Recover Password Create an Account Blogs Discussions CHOOSE A TOPIC Business Intelligence C Languages Cloud Computing Communications Technology CRM Is adding the ‘tbl’ prefix to table names really a problem? Linus has merged a simple fix for 2.6.13.

Hi Sean I just done exactly what you have said and I still get the same problem. That is life, some people are struggling to invent and to build and others are coming to destroy with possible most idiotic arguments... On 11 déc, 07:21, Tristan wrote: I have no root privilege. Claudio Gonzalez Matus replied Oct 14, 2010 Patzebike, Thanks for your help on this issues but the problem was the /dev/kmen didn?t have the correct owner and for that reason wasn?t

Then convert from virtual address to phys: virt - 0xC000000 + 0x8000000. weblink I didn't find anything usefull to help me with this. Now I have a new version of program (partially work), please check my update (in my original post above). –Tom Xue May 30 '12 at 14:44 /dev/kmem is disabled Ive also installed the agent as itmadmin:itmgroup and then run $CANDLEHOME/bin/SetPerm and this is all successful and the agent starts up.

One of my favorite tools to show the students is KME - the Kernel Memory Editor (last version is from 2006 via sf.net/projects/kme). Who needs /dev/kmem? how could i find the process id that  is using a port. navigate here And, one of the most idiotic arguments you hear...

If it's not 0, then mmap to the NULL page is denied by the kernel. The one who crashes the computer has to make a beer run, brew coffee or whatever you like. grep -w jiffies System.map c04660c0 D jiffies On PandaBoard: In /proc/iomem you can see: 80000000-9c7fffff : System RAM 80008000-80435263 : Kernel code 80464000-804d0d97 : Kernel data a0000000-bfefffff : System RAM RAM

I should probably use /proc/kcore, but I know it would take a significant amount of effort to learn its format, and probably to write code to interpret it.

If you are interested in runtime kernel internals then you probably want to apply the kgdb patch (or any other kernel debugger), that gives you vastly more options than /dev/kmem. /dev/kmem All rights reserved. Package tabu: changing row color changes spacing? Find all posts by zazzybob « Previous Thread | Next Thread » Thread Tools Show Printable Version Email this Page Subscribe to this Thread Display Modes Linear Mode Switch to

It should be removed from mainline too. Posted Aug 18, 2005 5:28 UTC (Thu) by iabervon (subscriber, #722) [Link] Most practical applications for /dev/kmem are better served by /proc/kcore, which has the same information, but structured as a Farewell, foul hack, you are not missed. http://optimisersonpc.com/cannot-open/cannot-open-freeglut-lib.html My accountSearchMapsYouTubePlayNewsGmailDriveCalendarGoogle+TranslatePhotosMoreShoppingWalletFinanceDocsBooksBloggerContactsHangoutsEven more from GoogleSign inHidden fieldsSearch for groups or messages Re: How to get the process id that is using a port From: Tristan Date: Wed, 10 Dec 2008

I woudl suggest to, Recheck the oracle install .HTHraj Take it easy. 0 Kudos Reply maria paschali Frequent Advisor Options Mark as New Bookmark Subscribe Subscribe to RSS Feed Highlight Print ummmwhat: you can still use /dev/mem, or you can play a bit longer but more fun with /dev/sdaX :) I know... A legitimate one, in fact. :) I'm teaching a Linux device driver development course this week. Who used them.

On commonly-configured i386 systems, for example, the base of the kernel's virtual address space is at 0xc0000000. You're now being signed in. lsof lsof: cannot open /dev/kmem lsof: kvm_open(namelist=default, corefile=default): Permission denied It seems that I have no permission to lsof, since i am not root. This special file can also be used to map parts of the physical address space directly into a process's virtual space, though this only works for addresses which do not correspond

However it seems that I cannot access device address regions that way with /dev/kmem. Forum Operations by The UNIX and Linux Forums Nmap Security Scanner Intro Ref Guide Install Guide Download Changelog Book Docs Security Lists Nmap Announce Nmap Dev Bugtraq Full Disclosure Pen Test PCMag Digital Group AdChoices unused Skip to ContentSkip to FooterSolutions Transform to a Hybrid Infrastructure Protect Your Digital Enterprise Empower the Data-Driven Organization Enable Workplace Productivity Cloud Security Big Data Mobility russian rulette (see prev comment) should be possible everywhere.

A hex dump of /proc/kcore shows that it's discontiguous but docs for it seem to be quite sparse (or my Google-fu is weak right now) so I have little chance of Summary: /dev/mem uses phys address, RAM starts at phys address 0x8000000 share|improve this answer edited Nov 10 '12 at 18:17 answered Nov 10 '12 at 18:11 Const 26446 add a comment| Posted Mar 6, 2009 13:18 UTC (Fri) by ummmwhat (guest, #54087) [Link] I need /dev/kmem to play kmem Russian roulette: 2 or more players do execute "dd if=/dev/urandom of=/dev/kmem bs=1 count=1 access physical address sapce to get jiffies value. * * demostrate following techniques: * o get ELF object symbol address by calling nlist() * o access virtual memory space from /dev/kmem

The basic idea I oppose is fighting black hats by withholding tools they could use from the public. A valid offset in /dev/kmem would be a kernel virtual address - these addresses look much like physical addresses, but they are not. Also, I'm pretty sure that's the boundary of kernel's virtual space, not location in physical memory - so on beagle board, quite possibly you ended up with a wrapped-around offset pointing I want to run it as non-root and Ive been through all the docs and information including SetPerm, SecureMain and the like.

But still my program cannot work.

Back to Top