Up to [cvs.NetBSD.org] / src / sys / dev
Request diff between arbitrary revisions
Default branch: MAIN
Current tag: MAIN
Revision 1.11 / (download) - annotate - [select for diffs], Sun Nov 25 15:29:24 2012 UTC (5 months, 3 weeks ago) by christos
CVS Tags: yamt-pagecache-base8, yamt-pagecache-base7, tls-maxphys-nbase, tls-maxphys-base, khorben-n900, agc-symver-base, agc-symver, HEAD
Changes since 1.10: +2 -12 lines
Diff to previous 1.10 (colored)
move context struct to a header for the benefit of fstat.
Revision 1.10 / (download) - annotate - [select for diffs], Sat May 19 16:00:41 2012 UTC (11 months, 4 weeks ago) by tls
CVS Tags: yamt-pagecache-base6, yamt-pagecache-base5, jmcneill-usbmp-base10
Branch point for: tls-maxphys
Changes since 1.9: +13 -10 lines
Diff to previous 1.9 (colored)
Fix two problems that could cause /dev/random to not wake up readers when entropy became available.
Revision 1.9 / (download) - annotate - [select for diffs], Fri Apr 20 21:57:33 2012 UTC (12 months, 3 weeks ago) by tls
CVS Tags: jmcneill-usbmp-base9
Changes since 1.8: +3 -5 lines
Diff to previous 1.8 (colored)
Fix a bug and a compilation problem. Bug: spin mutexes don't have owners, so KASSERT(!mutex_owned()) shouldn't be used to assert that the current LWP does not have the mutex. Compilation problem: explicitly include sys/mutex.h from rnd.h so evbarm builds again.
Revision 1.8 / (download) - annotate - [select for diffs], Tue Apr 17 02:50:38 2012 UTC (13 months ago) by tls
Changes since 1.7: +43 -9 lines
Diff to previous 1.7 (colored)
Address multiple problems with rnd(4)/cprng(9): 1) Add a per-cpu CPRNG to handle short reads from /dev/urandom so that programs like perl don't drain the entropy pool dry by repeatedly opening, reading 4 bytes, closing. 2) Really fix the locking around reseeds and destroys. 3) Fix the opportunistic-reseed strategy so it actually works, reseeding existing RNGs once each (as they are used, so idle RNGs don't get reseeded) until the pool is half empty or newly full again.
Revision 1.7 / (download) - annotate - [select for diffs], Fri Mar 30 20:15:18 2012 UTC (13 months, 2 weeks ago) by drochner
CVS Tags: yamt-pagecache-base4, jmcneill-usbmp-base8
Branch point for: yamt-pagecache
Changes since 1.6: +6 -7 lines
Diff to previous 1.6 (colored)
reorder initialization to improve error handling in case the system runs out of file descriptors, avoids LOCKDEBUG panic due to double mutex initialization
Revision 1.6 / (download) - annotate - [select for diffs], Tue Dec 20 13:42:19 2011 UTC (16 months, 4 weeks ago) by apb
CVS Tags: netbsd-6-base, jmcneill-usbmp-base7, jmcneill-usbmp-base6, jmcneill-usbmp-base5, jmcneill-usbmp-base4, jmcneill-usbmp-base3, jmcneill-usbmp-base2
Branch point for: netbsd-6, jmcneill-usbmp
Changes since 1.5: +2 -6 lines
Diff to previous 1.5 (colored)
Revert previous; the #include was already present, and I got confused by a merge error.
Revision 1.5 / (download) - annotate - [select for diffs], Tue Dec 20 12:45:00 2011 UTC (16 months, 4 weeks ago) by apb
Changes since 1.4: +6 -2 lines
Diff to previous 1.4 (colored)
Revision 1.4 / (download) - annotate - [select for diffs], Mon Dec 19 21:53:52 2011 UTC (16 months, 4 weeks ago) by apb
Changes since 1.3: +17 -5 lines
Diff to previous 1.3 (colored)
Add COMPAT_50 and COMPAT_NETBSD32 compatibility code for rnd(4) ioctl commands. Tested with "rndctl -ls" using an old 32-bit version of rndctl(8) (built for NetBSD-5.99.56/i386) and a new 64-bit kernel (NetBSD-5.99.59/amd64).
Revision 1.3 / (download) - annotate - [select for diffs], Mon Dec 19 21:44:08 2011 UTC (16 months, 4 weeks ago) by apb
Changes since 1.2: +4 -4 lines
Diff to previous 1.2 (colored)
Return ENOTTY, not EINVAL, when the ioctl command is unrecognised.
Revision 1.2 / (download) - annotate - [select for diffs], Mon Dec 19 11:10:08 2011 UTC (16 months, 4 weeks ago) by drochner
Changes since 1.1: +4 -4 lines
Diff to previous 1.1 (colored)
make this build with RND_DEBUG
Revision 1.1 / (download) - annotate - [select for diffs], Sat Dec 17 20:05:39 2011 UTC (17 months ago) by tls
Separate /dev/random pseudodevice implemenation from kernel entropy pool implementation. Rewrite pseudodevice code to use cprng_strong(9). The new pseudodevice is cloning, so each caller gets bits from a stream generated with its own key. Users of /dev/urandom get their generators keyed on a "best effort" basis -- the kernel will rekey generators whenever the entropy pool hits the high water mark -- while users of /dev/random get their generators rekeyed every time key-length bits are output. The underlying cprng_strong API can use AES-256 or AES-128, but we use AES-128 because of concerns about related-key attacks on AES-256. This improves performance (and reduces entropy pool depletion) significantly for users of /dev/urandom but does cause users of /dev/random to rekey twice as often. Also fixes various bugs (including some missing locking and a reseed-counter overflow in the CTR_DRBG code) found while testing this. For long reads, this generator is approximately 20 times as fast as the old generator (dd with bs=64K yields 53MB/sec on 2Ghz Core2 instead of 2.5MB/sec) and also uses a separate mutex per instance so concurrency is greatly improved. For reads of typical key sizes for modern cryptosystems (16-32 bytes) performance is about the same as the old code: a little better for 32 bytes, a little worse for 16 bytes.
This form allows you to request diff's between any two revisions of a file. You may select a symbolic revision name using the selection box or you may type in a numeric name using the type-in text box.