lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 10 Apr 2015 16:33:17 +0200 From: Stephan Mueller <smueller@...onox.de> To: mancha security <mancha1@...o.com> Cc: Hannes Frederic Sowa <hannes@...essinduktion.org>, Daniel Borkmann <daniel@...earbox.net>, tytso@....edu, linux-kernel@...r.kernel.org, linux-crypto@...r.kernel.org, herbert@...dor.apana.org.au, dborkman@...hat.com Subject: Re: [BUG/PATCH] kernel RNG and its secrets Am Freitag, 10. April 2015, 14:22:08 schrieb mancha security: Hi mancha, >__asm__ __volatile__("": :"r"(p) :"memory") gcc -O2/3: mov present clang -O2/3: mov present ==> approach would be good too. Note, the assembly code does not seem to change whether to use this approach or the one I initially tested. Ciao Stephan -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists