Re: [v4, resend] fcntl-linux.h: add new definitions and manual updates for open file description locks

2014-05-23 Thread Ondřej Bílka
On Sat, May 03, 2014 at 09:33:24AM -0400, Jeff Layton wrote: > Open file description locks have been merged into the Linux kernel for > v3.15. Add the appropriate command-value definitions and an update to > the manual that describes their usage. > > ChangeLog: > > 2014-04-24 Jeff Layton >

Re: [v4, resend] fcntl-linux.h: add new definitions and manual updates for open file description locks

2014-05-23 Thread Ondřej Bílka
On Sat, May 03, 2014 at 09:33:24AM -0400, Jeff Layton wrote: Open file description locks have been merged into the Linux kernel for v3.15. Add the appropriate command-value definitions and an update to the manual that describes their usage. ChangeLog: 2014-04-24 Jeff Layton

Re: [RFC] gcc feature request: Moving blocks into sections

2013-08-06 Thread Ondřej Bílka
On Tue, Aug 06, 2013 at 08:56:00PM -0400, Steven Rostedt wrote: > On Tue, 2013-08-06 at 20:45 -0400, Steven Rostedt wrote: > > > [3.387362] short jumps: 106 > > [3.390277] long jumps: 330 > > > > Thus, approximately 25%. Not bad. > > Also, where these happen to be is probably even more

Re: [RFC] gcc feature request: Moving blocks into sections

2013-08-06 Thread Ondřej Bílka
On Tue, Aug 06, 2013 at 08:56:00PM -0400, Steven Rostedt wrote: On Tue, 2013-08-06 at 20:45 -0400, Steven Rostedt wrote: [3.387362] short jumps: 106 [3.390277] long jumps: 330 Thus, approximately 25%. Not bad. Also, where these happen to be is probably even more important

Re: [PATCH] avoid entropy starvation due to stack protection

2012-12-21 Thread Ondřej Bílka
On Sat, Dec 15, 2012 at 07:30:20PM -0500, Theodore Ts'o wrote: > > What I would do instead is use an AES-based cryptographic random > number generator. That is, at boot time, grab enough randomness to > for an AES key, and then use that key to create a cryptographic random > number generator by

Re: [PATCH] avoid entropy starvation due to stack protection

2012-12-21 Thread Ondřej Bílka
On Sat, Dec 15, 2012 at 11:59:46PM +0100, Stephan Müller wrote: > Am 15.12.2012 20:15, schrieb Ondřej Bílka: > >Why not use nonblocking pool and seed nonblocking pool only with half of > >collected entropy to get /dev/random in almost all practical scenarios > >nonb

Re: [PATCH] avoid entropy starvation due to stack protection

2012-12-21 Thread Ondřej Bílka
On Sat, Dec 15, 2012 at 11:59:46PM +0100, Stephan Müller wrote: Am 15.12.2012 20:15, schrieb Ondřej Bílka: Why not use nonblocking pool and seed nonblocking pool only with half of collected entropy to get /dev/random in almost all practical scenarios nonblocking? I would not recommend

Re: [PATCH] avoid entropy starvation due to stack protection

2012-12-21 Thread Ondřej Bílka
On Sat, Dec 15, 2012 at 07:30:20PM -0500, Theodore Ts'o wrote: What I would do instead is use an AES-based cryptographic random number generator. That is, at boot time, grab enough randomness to for an AES key, and then use that key to create a cryptographic random number generator by

Re: [PATCH] avoid entropy starvation due to stack protection

2012-12-15 Thread Ondřej Bílka
Why not use nonblocking pool and seed nonblocking pool only with half of collected entropy to get /dev/random in almost all practical scenarios nonblocking? On Thu, Dec 13, 2012 at 08:44:36AM +0100, Stephan Mueller wrote: > On 13.12.2012 01:43:21, +0100, Andrew Morton > wrote: > > Hi Andrew, >

Re: [PATCH] avoid entropy starvation due to stack protection

2012-12-15 Thread Ondřej Bílka
Why not use nonblocking pool and seed nonblocking pool only with half of collected entropy to get /dev/random in almost all practical scenarios nonblocking? On Thu, Dec 13, 2012 at 08:44:36AM +0100, Stephan Mueller wrote: On 13.12.2012 01:43:21, +0100, Andrew Morton a...@linux-foundation.org

Re: [RFC] AES instead of SHA1 for /dev/urandom

2012-12-12 Thread Ondřej Bílka
On Wed, Dec 12, 2012 at 01:08:26PM +1100, NeilBrown wrote: > On Wed, 12 Dec 2012 03:03:54 +0100 Ondřej Bílka wrote: > > > I consider to speed-up /dev/urandom on recent intel processors by > > using hardware aes. Same for accelerated aes crypto. > > > > Would

Re: [RFC] AES instead of SHA1 for /dev/urandom

2012-12-12 Thread Ondřej Bílka
On Wed, Dec 12, 2012 at 01:08:26PM +1100, NeilBrown wrote: On Wed, 12 Dec 2012 03:03:54 +0100 Ondřej Bílka nel...@seznam.cz wrote: I consider to speed-up /dev/urandom on recent intel processors by using hardware aes. Same for accelerated aes crypto. Would you accept a patch if I wrote

[RFC] AES instead of SHA1 for /dev/urandom

2012-12-11 Thread Ondřej Bílka
I consider to speed-up /dev/urandom on recent intel processors by using hardware aes. Same for accelerated aes crypto. Would you accept a patch if I wrote it? -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More

[RFC] AES instead of SHA1 for /dev/urandom

2012-12-11 Thread Ondřej Bílka
I consider to speed-up /dev/urandom on recent intel processors by using hardware aes. Same for accelerated aes crypto. Would you accept a patch if I wrote it? -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to majord...@vger.kernel.org More