zig/lib/std/os
Andrew Kelley 53987c932c std.crypto.random: introduce fork safety
Everybody gets what they want!

 * AT_RANDOM is completely ignored.
 * On Linux, MADV_WIPEONFORK is used to provide fork safety.
 * On pthread systems, `pthread_atfork` is used to provide fork safety.
 * For systems that do not have the capability to provide fork safety,
   the implementation falls back to calling getrandom() every time.
 * If madvise is unavailable or returns an error, or pthread_atfork
   fails for whatever reason, it falls back to calling getrandom() every
   time.
 * Applications may choose to opt-out of fork safety.
 * Applications may choose to opt-in to unconditionally calling
   getrandom() for every call to std.crypto.random.fillFn.
 * Added `std.meta.globalOption`.
 * Added `std.os.madvise` and related bits.
 * Bumped up the size of the main thread TLS buffer. See the comment
   there for justification.
 * Simpler hot path in TLS initialization.
2020-12-18 15:54:01 -07:00
..
bits std.crypto.random: introduce fork safety 2020-12-18 15:54:01 -07:00
linux std.crypto.random: introduce fork safety 2020-12-18 15:54:01 -07:00
uefi
windows small fixes and zig fmt 2020-12-09 13:54:26 +02:00
bits.zig
darwin.zig
dragonfly.zig
freebsd.zig
linux.zig std.crypto.random: introduce fork safety 2020-12-18 15:54:01 -07:00
netbsd.zig
openbsd.zig
test.zig Disable sigaction test on i386 because of #7427 2020-12-13 19:35:40 +01:00
uefi.zig
wasi.zig
windows.zig MoveFileEx can return ACCESS_DENIED 2020-12-09 15:03:17 -07:00