<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src-test2/sys/dev/random, branch release/11.4.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src-test2/atom?h=release%2F11.4.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src-test2/atom?h=release%2F11.4.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/'/>
<updated>2019-04-26T01:58:36Z</updated>
<entry>
<title>MFC r345438,r345842,r346259,r346261: TPM as possible entropy source</title>
<updated>2019-04-26T01:58:36Z</updated>
<author>
<name>Marcin Wojtas</name>
<email>mw@FreeBSD.org</email>
</author>
<published>2019-04-26T01:58:36Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=541397a0bd02c96dfbf7413523553e06cbf0a613'/>
<id>urn:sha1:541397a0bd02c96dfbf7413523553e06cbf0a613</id>
<content type='text'>
r345438:
Allow using TPM as entropy source

TPM has a built-in RNG, with its own entropy source.
The driver was extended to harvest 16 random bytes from TPM every 10 seconds.
A new build option "TPM_HARVEST" was introduced - for now, however, it
is not enabled by default in the GENERIC config.

Reviewed by: markm, delphij
Approved by: secteam

r345842:
Add a cv_wait to the TPM2.0 harvesting function

r346259:
tpm: Prevent session hijack

r346261:
Improve tpm20 style

Submitted by: Kornel Duleba &lt;mindal@semihalf.com&gt;
Obtained from: Semihalf
Sponsored by: Stormshield
</content>
</entry>
<entry>
<title>Backport fixes from FreeBSD-12 to help the random(4) device thread</title>
<updated>2019-04-06T09:00:06Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2019-04-06T09:00:06Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=a6da48d418724227df9c4bc9ef486d0f26c4b207'/>
<id>urn:sha1:a6da48d418724227df9c4bc9ef486d0f26c4b207</id>
<content type='text'>
not overwhelm the OS:

a) Use the correct symbolic constant when calculating 10'ths of a
second. This means that expensive reseeds happen at ony 1/10 Hz,
not some kHz.

b) Rate limit internal high-rate harveting efforts. This stops the
harvesting thread from total overkilling the high-grade entropy-
gathering work, while still being very conservatively safe.

PR:		230808
Reported by:	danilo,eugen
Tested by:	eugen
Approved by:	so (blanket permission granted as I am the authour of this code)
Relnotes:	Yes
</content>
</entry>
<entry>
<title>Partial MFC of r338542:</title>
<updated>2018-09-25T05:18:20Z</updated>
<author>
<name>Xin LI</name>
<email>delphij@FreeBSD.org</email>
</author>
<published>2018-09-25T05:18:20Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=31535767b69421780ebdbcb37a8bac83ebdd8ef3'/>
<id>urn:sha1:31535767b69421780ebdbcb37a8bac83ebdd8ef3</id>
<content type='text'>
random(4): Squash non-error timeout code from tsleep(9).

PR:		231181
Submitted by:	cem
Reported by:	lev
Reviewed by:	vangyzen, markm, delphij
Approved by:	secteam (delphij)
Differential Revision:	https://reviews.freebsd.org/D17049
</content>
</entry>
<entry>
<title>Revert previous commit, until issue with sparc64 resolved.</title>
<updated>2016-06-09T14:44:05Z</updated>
<author>
<name>Simon J. Gerraty</name>
<email>sjg@FreeBSD.org</email>
</author>
<published>2016-06-09T14:44:05Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=208250ed4d89d962c38f2729a8179fcc7cc759a9'/>
<id>urn:sha1:208250ed4d89d962c38f2729a8179fcc7cc759a9</id>
<content type='text'>
Approved by:	so (implicit)
</content>
</entry>
<entry>
<title>Add a prototype for random_harvest_queue to dev/random/random_harvestq.h</title>
<updated>2016-06-09T01:50:43Z</updated>
<author>
<name>Simon J. Gerraty</name>
<email>sjg@FreeBSD.org</email>
</author>
<published>2016-06-09T01:50:43Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=6aacec26cc00a8f82b2dc92e5e3d00a768ae8464'/>
<id>urn:sha1:6aacec26cc00a8f82b2dc92e5e3d00a768ae8464</id>
<content type='text'>
This fixes a warning that occurs in a number of files that use the
random_harvest_queue function.

Differential Revision:	https://reviews.freebsd.org/D4229
Submitted by:	stevek@juniper.net
Reviewed by:	markm
Approved by:	so
</content>
</entry>
<entry>
<title>Don't repeat the the word 'the'</title>
<updated>2016-05-17T12:52:31Z</updated>
<author>
<name>Eitan Adler</name>
<email>eadler@FreeBSD.org</email>
</author>
<published>2016-05-17T12:52:31Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=cef367e6a15b6e3e2aca88d453c74962cf1f94e7'/>
<id>urn:sha1:cef367e6a15b6e3e2aca88d453c74962cf1f94e7</id>
<content type='text'>
(one manual change to fix grammar)

Confirmed With: db
Approved by: secteam (not really, but this is a comment typo fix)
</content>
</entry>
<entry>
<title>dev/random: minor spelling fixes in comments.</title>
<updated>2016-05-02T14:35:57Z</updated>
<author>
<name>Pedro F. Giffuni</name>
<email>pfg@FreeBSD.org</email>
</author>
<published>2016-05-02T14:35:57Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=32a71a72e1e8142c317c2164ef5903eac12fd8fd'/>
<id>urn:sha1:32a71a72e1e8142c317c2164ef5903eac12fd8fd</id>
<content type='text'>
No functional change.

Reviewed by:	markm
Approved by:	so
</content>
</entry>
<entry>
<title>dev/random: use our roundup() macro instead of re-implementing it.</title>
<updated>2016-04-25T21:14:32Z</updated>
<author>
<name>Pedro F. Giffuni</name>
<email>pfg@FreeBSD.org</email>
</author>
<published>2016-04-25T21:14:32Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=7b250b1ec9da6b80d73784911c59c64d688789ad'/>
<id>urn:sha1:7b250b1ec9da6b80d73784911c59c64d688789ad</id>
<content type='text'>
While here also use howmany() macro from sys/param.h
No functional change.

Reviewed by:	markm (roundup replacement part)
Approved by:	so
</content>
</entry>
<entry>
<title>Fix rdrand_rng.ko and padlock_rng.ko dependencies, making modules</title>
<updated>2016-04-16T06:10:47Z</updated>
<author>
<name>Konstantin Belousov</name>
<email>kib@FreeBSD.org</email>
</author>
<published>2016-04-16T06:10:47Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=97b9c34fc2c65356a3a77ce0494f6ddf7d0a5358'/>
<id>urn:sha1:97b9c34fc2c65356a3a77ce0494f6ddf7d0a5358</id>
<content type='text'>
loadable when not compiled into the kernel.

Approved by:	so (delphij)
Sponsored by:	The FreeBSD Foundation
</content>
</entry>
<entry>
<title>Don't start the random harvester process until timers are working.</title>
<updated>2016-03-28T21:51:56Z</updated>
<author>
<name>John Baldwin</name>
<email>jhb@FreeBSD.org</email>
</author>
<published>2016-03-28T21:51:56Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=dd523908364a05f5a22c652a22edd76bf40bf0a9'/>
<id>urn:sha1:dd523908364a05f5a22c652a22edd76bf40bf0a9</id>
<content type='text'>
This is a no-op currently, but in kernels with earlier AP startup, the
random kthread was trying to use timeouts with sleeps before timers are
working.  Wait until SI_SUB_KICK_SCHEDULER to start the random kproc.

Reviewed by:	delphij, imp, markm
Approved by:	so
Sponsored by:	Netflix
Differential Revision:	https://reviews.freebsd.org/D5712
</content>
</entry>
</feed>
