History log of /netbsd/sys/dev/ldvar.h (Results 1 – 25 of 35)
Revision Date Author Comments
# 88181ca0 30-May-2021 riastradh <riastradh@NetBSD.org>

ld(4): Block requests while suspended until resumed.

Otherwise nothing stops us from continuing to feed I/O to the disk
controller when it expects that the queues are quiesced as it pokes
registers

ld(4): Block requests while suspended until resumed.

Otherwise nothing stops us from continuing to feed I/O to the disk
controller when it expects that the queues are quiesced as it pokes
registers to change its power states. Fixes resume during disk
activity on my T480 with nvme.

show more ...


# 784c245f 02-Aug-2020 riastradh <riastradh@NetBSD.org>

Remove unnecessary wait in ldbegindetach.

Like disk_begindetach, ldbegindetach only commits to detaching but
doesn't wait for existing xfers to drain; it is up to the driver to
abort them, once we a

Remove unnecessary wait in ldbegindetach.

Like disk_begindetach, ldbegindetach only commits to detaching but
doesn't wait for existing xfers to drain; it is up to the driver to
abort them, once we are committed, and then ldenddetach to wait for
them to drain.

show more ...


# cff2f8b6 19-Mar-2019 mlelstv <mlelstv@NetBSD.org>

Let backend provide a disk type. The information can be queried through
drvctl(4).


# dca305c2 20-Aug-2017 mlelstv <mlelstv@NetBSD.org>

make the sc_discard interface for the ld backend asynchronous and
signal completion through new callback lddiscardend. Use a standard
struct buf to pass disk address and range instead of two off_t va

make the sc_discard interface for the ld backend asynchronous and
signal completion through new callback lddiscardend. Use a standard
struct buf to pass disk address and range instead of two off_t values.

make lddiscard synchronous again. This is a requirement of the current
ffs discard code.

show more ...


# 1ee3617c 09-Aug-2017 mlelstv <mlelstv@NetBSD.org>

While ld(4) is MP safe, many backends are not.

Add a flag for backends that are MP safe. Take KERNEL_LOCK when calling
into a backend that doesn't have the flag set. Do the same for the
discard rout

While ld(4) is MP safe, many backends are not.

Add a flag for backends that are MP safe. Take KERNEL_LOCK when calling
into a backend that doesn't have the flag set. Do the same for the
discard routine.

Fixes PR 52462.

show more ...


# a3edaa50 27-Apr-2017 jdolecek <jdolecek@NetBSD.org>

do not attach nvme ld as randomness source - device is too fast, it overwhelms
the rndq handling code, and causes system crashes; gathering rnd there is
also bad idea from performance perspective


# 141e580a 27-Feb-2017 jdolecek <jdolecek@NetBSD.org>

refactor the ld(4) DIOCCACHESYNC hook into general ioctl hook, so that attachments
would be able to implement arbitrary other ioctls


# 9c84788c 16-Sep-2016 jdolecek <jdolecek@NetBSD.org>

modify ldattach() to have default strategy as a parameter


# abcfff65 28-Aug-2015 mlelstv <mlelstv@NetBSD.org>

move entropy gathering into dksubr.


# 0b6495d5 17-Aug-2015 jakllsch <jakllsch@NetBSD.org>

Add support for implementing discard functionality with ld(4)


# 335da56c 16-Aug-2015 mlelstv <mlelstv@NetBSD.org>

replace spl and tsleep with mutex and condvar.


# eea42a36 26-Jul-2015 skrll <skrll@NetBSD.org>

Whitespace


# ae5523a8 02-May-2015 mlelstv <mlelstv@NetBSD.org>

Merge dk_intf and dkdriver interfaces.
Merge common disk driver functionality in ld.c with dksubr.c.
Adjust the two previous users of dk_intf (cgd and xbd) to
the changes.

bump kernel version to 7.9

Merge dk_intf and dkdriver interfaces.
Merge common disk driver functionality in ld.c with dksubr.c.
Adjust the two previous users of dk_intf (cgd and xbd) to
the changes.

bump kernel version to 7.99.14

show more ...


# 7c77bcc9 13-Apr-2015 riastradh <riastradh@NetBSD.org>

Convert sys/dev to use <sys/rndsource.h>.


# cb495fdb 03-May-2012 bsh <bsh@NetBSD.org>

use uint64_t for sc_disksize512.
fixed the problem with ataraid volumes larger than 2 TiB.


# cc9ee3de 02-Feb-2012 tls <tls@NetBSD.org>

Entropy-pool implementation move and cleanup.

1) Move core entropy-pool code and source/sink/sample management code
to sys/kern from sys/dev.

2) Remove use of NRND as test for presence of entrop

Entropy-pool implementation move and cleanup.

1) Move core entropy-pool code and source/sink/sample management code
to sys/kern from sys/dev.

2) Remove use of NRND as test for presence of entropy-pool code throughout
source tree.

3) Remove use of RND_ENABLED in device drivers as microoptimization to
avoid expensive operations on disabled entropy sources; make the
rnd_add calls do this directly so all callers benefit.

4) Fix bug in recent rnd_add_data()/rnd_add_uint32() changes that might
have lead to slight entropy overestimation for some sources.

5) Add new source types for environmental sensors, power sensors, VM
system events, and skew between clocks, with a sample implementation
for each.

ok releng to go in before the branch due to the difficulty of later
pullup (widespread #ifdef removal and moved files). Tested with release
builds on amd64 and evbarm and live testing on amd64.

show more ...


# 8e933452 19-Nov-2011 tls <tls@NetBSD.org>

First step of random number subsystem rework described in
<20111022023242.BA26F14A158@mail.netbsd.org>. This change includes
the following:

An initial cleanup and minor reorganization of the entro

First step of random number subsystem rework described in
<20111022023242.BA26F14A158@mail.netbsd.org>. This change includes
the following:

An initial cleanup and minor reorganization of the entropy pool
code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are
fixed. Some effort is made to accumulate entropy more quickly at
boot time.

A generic interface, "rndsink", is added, for stream generators to
request that they be re-keyed with good quality entropy from the pool
as soon as it is available.

The arc4random()/arc4randbytes() implementation in libkern is
adjusted to use the rndsink interface for rekeying, which helps
address the problem of low-quality keys at boot time.

An implementation of the FIPS 140-2 statistical tests for random
number generator quality is provided (libkern/rngtest.c). This
is based on Greg Rose's implementation from Qualcomm.

A new random stream generator, nist_ctr_drbg, is provided. It is
based on an implementation of the NIST SP800-90 CTR_DRBG by
Henric Jungheim. This generator users AES in a modified counter
mode to generate a backtracking-resistant random stream.

An abstraction layer, "cprng", is provided for in-kernel consumers
of randomness. The arc4random/arc4randbytes API is deprecated for
in-kernel use. It is replaced by "cprng_strong". The current
cprng_fast implementation wraps the existing arc4random
implementation. The current cprng_strong implementation wraps the
new CTR_DRBG implementation. Both interfaces are rekeyed from
the entropy pool automatically at intervals justifiable from best
current cryptographic practice.

In some quick tests, cprng_fast() is about the same speed as
the old arc4randbytes(), and cprng_strong() is about 20% faster
than rnd_extract_data(). Performance is expected to improve.

The AES code in src/crypto/rijndael is no longer an optional
kernel component, as it is required by cprng_strong, which is
not an optional kernel component.

The entropy pool output is subjected to the rngtest tests at
startup time; if it fails, the system will reboot. There is
approximately a 3/10000 chance of a false positive from these
tests. Entropy pool _input_ from hardware random numbers is
subjected to the rngtest tests at attach time, as well as the
FIPS continuous-output test, to detect bad or stuck hardware
RNGs; if any are detected, they are detached, but the system
continues to run.

A problem with rndctl(8) is fixed -- datastructures with
pointers in arrays are no longer passed to userspace (this
was not a security problem, but rather a major issue for
compat32). A new kernel will require a new rndctl.

The sysctl kern.arandom() and kern.urandom() nodes are hooked
up to the new generators, but the /dev/*random pseudodevices
are not, yet.

Manual pages for the new kernel interfaces are forthcoming.

show more ...


# e7ce62fd 20-Sep-2010 kiyohara <kiyohara@NetBSD.org>

Check disk bounds, in RAW_PART.


# 645bab63 18-Dec-2009 jakllsch <jakllsch@NetBSD.org>

Use "rnd.h" and <sys/rnd.h> to ensure that struct ld_softc
is always of consistent layout. Should prevent another
someone from spending a few hours trying to figure out why
their code crashes becaus

Use "rnd.h" and <sys/rnd.h> to ensure that struct ld_softc
is always of consistent layout. Should prevent another
someone from spending a few hours trying to figure out why
their code crashes because they didn't realize they needed
to have "rnd.h" included already.

show more ...


# 6ee74bfd 07-May-2009 cegger <cegger@NetBSD.org>

struct device * -> device_t, no functional changes intended.


# 362b2f2b 09-Sep-2008 tron <tron@NetBSD.org>

Complete device_t/softc split for the ld(4) attachments. This should
prevent crashes while attaching a drive.

Patch supplied by Juan RP in PR kern/39468.


# 82bb1c2f 11-Aug-2008 simonb <simonb@NetBSD.org>

Add a flags argument to the ld(4) flush handlers, and call these with a
"poll" flag when called from ld_shutdown().

This is the infrastructure part of kern/38655 - in itself it doesn't
fix the panic

Add a flags argument to the ld(4) flush handlers, and call these with a
"poll" flag when called from ld_shutdown().

This is the infrastructure part of kern/38655 - in itself it doesn't
fix the panic referenced in that PR.

XXX: At least ld_twa.c and perhaps ld_iop.c and ld_icp.c need to
check for this new poll flag and do something useful.

show more ...


# ce099b40 28-Apr-2008 martin <martin@NetBSD.org>

Remove clause 3 and 4 from TNF licenses


# b07ec3fc 09-Feb-2007 ad <ad@NetBSD.org>

Merge newlock2 to head.


# 95e1ffb1 11-Dec-2005 christos <christos@NetBSD.org>

merge ktrace-lwp.


12