#
88181ca0 |
| 30-May-2021 |
riastradh <riastradh@NetBSD.org> |
ld(4): Block requests while suspended until resumed.
Otherwise nothing stops us from continuing to feed I/O to the disk controller when it expects that the queues are quiesced as it pokes registers
ld(4): Block requests while suspended until resumed.
Otherwise nothing stops us from continuing to feed I/O to the disk controller when it expects that the queues are quiesced as it pokes registers to change its power states. Fixes resume during disk activity on my T480 with nvme.
show more ...
|
#
784c245f |
| 02-Aug-2020 |
riastradh <riastradh@NetBSD.org> |
Remove unnecessary wait in ldbegindetach.
Like disk_begindetach, ldbegindetach only commits to detaching but doesn't wait for existing xfers to drain; it is up to the driver to abort them, once we a
Remove unnecessary wait in ldbegindetach.
Like disk_begindetach, ldbegindetach only commits to detaching but doesn't wait for existing xfers to drain; it is up to the driver to abort them, once we are committed, and then ldenddetach to wait for them to drain.
show more ...
|
#
cff2f8b6 |
| 19-Mar-2019 |
mlelstv <mlelstv@NetBSD.org> |
Let backend provide a disk type. The information can be queried through drvctl(4).
|
#
dca305c2 |
| 20-Aug-2017 |
mlelstv <mlelstv@NetBSD.org> |
make the sc_discard interface for the ld backend asynchronous and signal completion through new callback lddiscardend. Use a standard struct buf to pass disk address and range instead of two off_t va
make the sc_discard interface for the ld backend asynchronous and signal completion through new callback lddiscardend. Use a standard struct buf to pass disk address and range instead of two off_t values.
make lddiscard synchronous again. This is a requirement of the current ffs discard code.
show more ...
|
#
1ee3617c |
| 09-Aug-2017 |
mlelstv <mlelstv@NetBSD.org> |
While ld(4) is MP safe, many backends are not.
Add a flag for backends that are MP safe. Take KERNEL_LOCK when calling into a backend that doesn't have the flag set. Do the same for the discard rout
While ld(4) is MP safe, many backends are not.
Add a flag for backends that are MP safe. Take KERNEL_LOCK when calling into a backend that doesn't have the flag set. Do the same for the discard routine.
Fixes PR 52462.
show more ...
|
#
a3edaa50 |
| 27-Apr-2017 |
jdolecek <jdolecek@NetBSD.org> |
do not attach nvme ld as randomness source - device is too fast, it overwhelms the rndq handling code, and causes system crashes; gathering rnd there is also bad idea from performance perspective
|
#
141e580a |
| 27-Feb-2017 |
jdolecek <jdolecek@NetBSD.org> |
refactor the ld(4) DIOCCACHESYNC hook into general ioctl hook, so that attachments would be able to implement arbitrary other ioctls
|
#
9c84788c |
| 16-Sep-2016 |
jdolecek <jdolecek@NetBSD.org> |
modify ldattach() to have default strategy as a parameter
|
#
abcfff65 |
| 28-Aug-2015 |
mlelstv <mlelstv@NetBSD.org> |
move entropy gathering into dksubr.
|
#
0b6495d5 |
| 17-Aug-2015 |
jakllsch <jakllsch@NetBSD.org> |
Add support for implementing discard functionality with ld(4)
|
#
335da56c |
| 16-Aug-2015 |
mlelstv <mlelstv@NetBSD.org> |
replace spl and tsleep with mutex and condvar.
|
#
eea42a36 |
| 26-Jul-2015 |
skrll <skrll@NetBSD.org> |
Whitespace
|
#
ae5523a8 |
| 02-May-2015 |
mlelstv <mlelstv@NetBSD.org> |
Merge dk_intf and dkdriver interfaces. Merge common disk driver functionality in ld.c with dksubr.c. Adjust the two previous users of dk_intf (cgd and xbd) to the changes.
bump kernel version to 7.9
Merge dk_intf and dkdriver interfaces. Merge common disk driver functionality in ld.c with dksubr.c. Adjust the two previous users of dk_intf (cgd and xbd) to the changes.
bump kernel version to 7.99.14
show more ...
|
#
7c77bcc9 |
| 13-Apr-2015 |
riastradh <riastradh@NetBSD.org> |
Convert sys/dev to use <sys/rndsource.h>.
|
#
cb495fdb |
| 03-May-2012 |
bsh <bsh@NetBSD.org> |
use uint64_t for sc_disksize512. fixed the problem with ataraid volumes larger than 2 TiB.
|
#
cc9ee3de |
| 02-Feb-2012 |
tls <tls@NetBSD.org> |
Entropy-pool implementation move and cleanup.
1) Move core entropy-pool code and source/sink/sample management code to sys/kern from sys/dev.
2) Remove use of NRND as test for presence of entrop
Entropy-pool implementation move and cleanup.
1) Move core entropy-pool code and source/sink/sample management code to sys/kern from sys/dev.
2) Remove use of NRND as test for presence of entropy-pool code throughout source tree.
3) Remove use of RND_ENABLED in device drivers as microoptimization to avoid expensive operations on disabled entropy sources; make the rnd_add calls do this directly so all callers benefit.
4) Fix bug in recent rnd_add_data()/rnd_add_uint32() changes that might have lead to slight entropy overestimation for some sources.
5) Add new source types for environmental sensors, power sensors, VM system events, and skew between clocks, with a sample implementation for each.
ok releng to go in before the branch due to the difficulty of later pullup (widespread #ifdef removal and moved files). Tested with release builds on amd64 and evbarm and live testing on amd64.
show more ...
|
#
8e933452 |
| 19-Nov-2011 |
tls <tls@NetBSD.org> |
First step of random number subsystem rework described in <20111022023242.BA26F14A158@mail.netbsd.org>. This change includes the following:
An initial cleanup and minor reorganization of the entro
First step of random number subsystem rework described in <20111022023242.BA26F14A158@mail.netbsd.org>. This change includes the following:
An initial cleanup and minor reorganization of the entropy pool code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are fixed. Some effort is made to accumulate entropy more quickly at boot time.
A generic interface, "rndsink", is added, for stream generators to request that they be re-keyed with good quality entropy from the pool as soon as it is available.
The arc4random()/arc4randbytes() implementation in libkern is adjusted to use the rndsink interface for rekeying, which helps address the problem of low-quality keys at boot time.
An implementation of the FIPS 140-2 statistical tests for random number generator quality is provided (libkern/rngtest.c). This is based on Greg Rose's implementation from Qualcomm.
A new random stream generator, nist_ctr_drbg, is provided. It is based on an implementation of the NIST SP800-90 CTR_DRBG by Henric Jungheim. This generator users AES in a modified counter mode to generate a backtracking-resistant random stream.
An abstraction layer, "cprng", is provided for in-kernel consumers of randomness. The arc4random/arc4randbytes API is deprecated for in-kernel use. It is replaced by "cprng_strong". The current cprng_fast implementation wraps the existing arc4random implementation. The current cprng_strong implementation wraps the new CTR_DRBG implementation. Both interfaces are rekeyed from the entropy pool automatically at intervals justifiable from best current cryptographic practice.
In some quick tests, cprng_fast() is about the same speed as the old arc4randbytes(), and cprng_strong() is about 20% faster than rnd_extract_data(). Performance is expected to improve.
The AES code in src/crypto/rijndael is no longer an optional kernel component, as it is required by cprng_strong, which is not an optional kernel component.
The entropy pool output is subjected to the rngtest tests at startup time; if it fails, the system will reboot. There is approximately a 3/10000 chance of a false positive from these tests. Entropy pool _input_ from hardware random numbers is subjected to the rngtest tests at attach time, as well as the FIPS continuous-output test, to detect bad or stuck hardware RNGs; if any are detected, they are detached, but the system continues to run.
A problem with rndctl(8) is fixed -- datastructures with pointers in arrays are no longer passed to userspace (this was not a security problem, but rather a major issue for compat32). A new kernel will require a new rndctl.
The sysctl kern.arandom() and kern.urandom() nodes are hooked up to the new generators, but the /dev/*random pseudodevices are not, yet.
Manual pages for the new kernel interfaces are forthcoming.
show more ...
|
#
e7ce62fd |
| 20-Sep-2010 |
kiyohara <kiyohara@NetBSD.org> |
Check disk bounds, in RAW_PART.
|
#
645bab63 |
| 18-Dec-2009 |
jakllsch <jakllsch@NetBSD.org> |
Use "rnd.h" and <sys/rnd.h> to ensure that struct ld_softc is always of consistent layout. Should prevent another someone from spending a few hours trying to figure out why their code crashes becaus
Use "rnd.h" and <sys/rnd.h> to ensure that struct ld_softc is always of consistent layout. Should prevent another someone from spending a few hours trying to figure out why their code crashes because they didn't realize they needed to have "rnd.h" included already.
show more ...
|
#
6ee74bfd |
| 07-May-2009 |
cegger <cegger@NetBSD.org> |
struct device * -> device_t, no functional changes intended.
|
#
362b2f2b |
| 09-Sep-2008 |
tron <tron@NetBSD.org> |
Complete device_t/softc split for the ld(4) attachments. This should prevent crashes while attaching a drive.
Patch supplied by Juan RP in PR kern/39468.
|
#
82bb1c2f |
| 11-Aug-2008 |
simonb <simonb@NetBSD.org> |
Add a flags argument to the ld(4) flush handlers, and call these with a "poll" flag when called from ld_shutdown().
This is the infrastructure part of kern/38655 - in itself it doesn't fix the panic
Add a flags argument to the ld(4) flush handlers, and call these with a "poll" flag when called from ld_shutdown().
This is the infrastructure part of kern/38655 - in itself it doesn't fix the panic referenced in that PR.
XXX: At least ld_twa.c and perhaps ld_iop.c and ld_icp.c need to check for this new poll flag and do something useful.
show more ...
|
#
ce099b40 |
| 28-Apr-2008 |
martin <martin@NetBSD.org> |
Remove clause 3 and 4 from TNF licenses
|
#
b07ec3fc |
| 09-Feb-2007 |
ad <ad@NetBSD.org> |
Merge newlock2 to head.
|
#
95e1ffb1 |
| 11-Dec-2005 |
christos <christos@NetBSD.org> |
merge ktrace-lwp.
|