lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 12 Aug 2020 09:13:26 +0200 From: Sedat Dilek <sedat.dilek@...il.com> To: Eric Dumazet <edumazet@...gle.com> Cc: netdev@...r.kernel.org Subject: Re: Flaw in "random32: update the net random state on interrupt and activity" On Wed, Aug 12, 2020 at 8:35 AM Sedat Dilek <sedat.dilek@...il.com> wrote: > > [ INSTRUCTIONS ] > > echo 1 > /proc/sys/kernel/sched_schedstats > echo prandom_u32 >> /sys/kernel/debug/tracing/set_event > echo traceon > /sys/kernel/debug/tracing/events/random/prandom_u32/trigger > echo 1 > /sys/kernel/debug/tracing/events/enable > > /home/dileks/bin/perf record -e random:prandom_u32 -a -g -- sleep 10 > > That gives me now some perf data. > I perf-probed for tcp_v4_connect: /home/dileks/bin/perf probe --add tcp_v4_connect /home/dileks/bin/perf list | grep probe: probe:tcp_v4_connect [Tracepoint event] /home/dileks/bin/perf record -e probe:tcp_v4_connect -a -g -- sleep 10 /home/dileks/bin/perf record -e probe:tcp_v4_connect,random:prandom_u32 -a -g -- sleep 10 /home/dileks/bin/perf report --stdio - Sedat -
Powered by blists - more mailing lists