#
64293e57 |
| 28-Oct-2024 |
mvs <mvs@openbsd.org> |
Unlock KERN_ALLOWKMEM. The `allowkmem' is atomically accessed integer.
Also use atomic_load_int(9) to load `securelevel'. sysctl_securelevel() is mp-safe, but will be under kernel lock until all exi
Unlock KERN_ALLOWKMEM. The `allowkmem' is atomically accessed integer.
Also use atomic_load_int(9) to load `securelevel'. sysctl_securelevel() is mp-safe, but will be under kernel lock until all existing `securelevel' loading became mp-safe too.
ok mpi
show more ...
|
#
87449d88 |
| 23-Jun-2024 |
kettenis <kettenis@openbsd.org> |
If an ioctl(2) request isn't implemented we should return ENOTTY.
ok deraadt@
|
#
3e676399 |
| 19-Feb-2018 |
mpi <mpi@openbsd.org> |
Remove almost unused `flags' argument of suser().
The account flag `ASU' will no longer be set but that makes suser() mpsafe since it no longer mess with a per-process field.
No objection from mill
Remove almost unused `flags' argument of suser().
The account flag `ASU' will no longer be set but that makes suser() mpsafe since it no longer mess with a per-process field.
No objection from millert@, ok tedu@, bluhm@
show more ...
|
#
c2a35b38 |
| 14-Dec-2017 |
guenther <guenther@openbsd.org> |
fcntl(F_SETFL) invokes the FIONBIO and FIOASYNC ioctls internally, so the memory devices (/dev/null, /dev/zero, etc) need to permit them.
problem noted, tweak, and testing by jeremy@ ok deraadt@
|
#
19aedf23 |
| 25-Sep-2016 |
deraadt <deraadt@openbsd.org> |
Make a move towards ending 4 decades of kernel snooping.
Add sysctl kern.allowkmem (default 0) which controls the ability to open /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converte
Make a move towards ending 4 decades of kernel snooping.
Add sysctl kern.allowkmem (default 0) which controls the ability to open /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% of utilities in the tree to operate on sysctl-nodes (either by themselves or via code hiding in the guts of -lkvm).
pstat -d and -v & procmap are affected and continued use of them will require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's buddy sendbug) are affected, but we'll work out a solution soon.
There will be some impact in ports.
ok kettenis guenther
show more ...
|
#
9f661d4f |
| 16-Aug-2016 |
tedu <tedu@openbsd.org> |
remove #define for /dev/mem minors. let the raw magic of the hardcoded numbers serve as a warning not to touch them.
|
#
7fe9dc3e |
| 15-Aug-2016 |
tedu <tedu@openbsd.org> |
normalize some comments
|
#
9c829367 |
| 10-Feb-2015 |
miod <miod@openbsd.org> |
Convert to uiomove(). ok guenther@
|
#
081bf720 |
| 10-Feb-2015 |
miod <miod@openbsd.org> |
First step towards making uiomove() take a size_t size argument: - rename uiomove() to uiomovei() and update all its users. - introduce uiomove(), which is similar to uiomovei() but with a size_t. -
First step towards making uiomove() take a size_t size argument: - rename uiomove() to uiomovei() and update all its users. - introduce uiomove(), which is similar to uiomovei() but with a size_t. - rewrite uiomovei() as an uiomove() wrapper. ok kettenis@
show more ...
|
#
97c974cd |
| 26-Dec-2010 |
miod <miod@openbsd.org> |
Kill pmap_phys_address(), and force every driver's mmap() routine to return a physical address [more precisely, something suitable to pass to pmap_enter()'sphysical address argument].
This allows MI
Kill pmap_phys_address(), and force every driver's mmap() routine to return a physical address [more precisely, something suitable to pass to pmap_enter()'sphysical address argument].
This allows MI drivers to implement mmap() routines without having to know about the pmap_phys_address() implementation and #ifdef obfuscation.
show more ...
|
#
184c5478 |
| 06-Oct-2007 |
krw <krw@openbsd.org> |
Simpliest memset(,0,) -> M_ZERO changes. One (caddr *) cast removal, otherwise just adding M_ZERO to malloc() and removing the immediately adjacent memset(,0,).
|
#
ad427450 |
| 05-Dec-2006 |
drahn <drahn@openbsd.org> |
Allow kmem to work, might not quite be right yet, but allows basic functionality. sort of ok miod@
|
#
95c7671f |
| 06-Oct-2006 |
miod <miod@openbsd.org> |
Preliminary bits for SuperH-based ports, based on NetBSD/sh3 codebase with minor changes.
|