History log of /openbsd/sys/arch/sh/sh/mem.c (Results 1 – 13 of 13)
Revision Date Author Comments
# 64293e57 28-Oct-2024 mvs <mvs@openbsd.org>

Unlock KERN_ALLOWKMEM. The `allowkmem' is atomically accessed integer.

Also use atomic_load_int(9) to load `securelevel'. sysctl_securelevel()
is mp-safe, but will be under kernel lock until all exi

Unlock KERN_ALLOWKMEM. The `allowkmem' is atomically accessed integer.

Also use atomic_load_int(9) to load `securelevel'. sysctl_securelevel()
is mp-safe, but will be under kernel lock until all existing
`securelevel' loading became mp-safe too.

ok mpi

show more ...


# 87449d88 23-Jun-2024 kettenis <kettenis@openbsd.org>

If an ioctl(2) request isn't implemented we should return ENOTTY.

ok deraadt@


# 3e676399 19-Feb-2018 mpi <mpi@openbsd.org>

Remove almost unused `flags' argument of suser().

The account flag `ASU' will no longer be set but that makes suser()
mpsafe since it no longer mess with a per-process field.

No objection from mill

Remove almost unused `flags' argument of suser().

The account flag `ASU' will no longer be set but that makes suser()
mpsafe since it no longer mess with a per-process field.

No objection from millert@, ok tedu@, bluhm@

show more ...


# c2a35b38 14-Dec-2017 guenther <guenther@openbsd.org>

fcntl(F_SETFL) invokes the FIONBIO and FIOASYNC ioctls internally, so
the memory devices (/dev/null, /dev/zero, etc) need to permit them.

problem noted, tweak, and testing by jeremy@
ok deraadt@


# 19aedf23 25-Sep-2016 deraadt <deraadt@openbsd.org>

Make a move towards ending 4 decades of kernel snooping.

Add sysctl kern.allowkmem (default 0) which controls the ability to open
/dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converte

Make a move towards ending 4 decades of kernel snooping.

Add sysctl kern.allowkmem (default 0) which controls the ability to open
/dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99%
of utilities in the tree to operate on sysctl-nodes (either by themselves
or via code hiding in the guts of -lkvm).

pstat -d and -v & procmap are affected and continued use of them will
require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's
buddy sendbug) are affected, but we'll work out a solution soon.

There will be some impact in ports.

ok kettenis guenther

show more ...


# 9f661d4f 16-Aug-2016 tedu <tedu@openbsd.org>

remove #define for /dev/mem minors. let the raw magic of the hardcoded
numbers serve as a warning not to touch them.


# 7fe9dc3e 15-Aug-2016 tedu <tedu@openbsd.org>

normalize some comments


# 9c829367 10-Feb-2015 miod <miod@openbsd.org>

Convert to uiomove().
ok guenther@


# 081bf720 10-Feb-2015 miod <miod@openbsd.org>

First step towards making uiomove() take a size_t size argument:
- rename uiomove() to uiomovei() and update all its users.
- introduce uiomove(), which is similar to uiomovei() but with a size_t.
-

First step towards making uiomove() take a size_t size argument:
- rename uiomove() to uiomovei() and update all its users.
- introduce uiomove(), which is similar to uiomovei() but with a size_t.
- rewrite uiomovei() as an uiomove() wrapper.
ok kettenis@

show more ...


# 97c974cd 26-Dec-2010 miod <miod@openbsd.org>

Kill pmap_phys_address(), and force every driver's mmap() routine to return
a physical address [more precisely, something suitable to pass to pmap_enter()'sphysical address argument].

This allows MI

Kill pmap_phys_address(), and force every driver's mmap() routine to return
a physical address [more precisely, something suitable to pass to pmap_enter()'sphysical address argument].

This allows MI drivers to implement mmap() routines without having to know
about the pmap_phys_address() implementation and #ifdef obfuscation.

show more ...


# 184c5478 06-Oct-2007 krw <krw@openbsd.org>

Simpliest memset(,0,) -> M_ZERO changes. One (caddr *) cast removal,
otherwise just adding M_ZERO to malloc() and removing the immediately
adjacent memset(,0,).


# ad427450 05-Dec-2006 drahn <drahn@openbsd.org>

Allow kmem to work, might not quite be right yet, but allows basic
functionality. sort of ok miod@


# 95c7671f 06-Oct-2006 miod <miod@openbsd.org>

Preliminary bits for SuperH-based ports, based on NetBSD/sh3 codebase with
minor changes.