From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pg1-x533.google.com (mail-pg1-x533.google.com [IPv6:2607:f8b0:4864:20::533]) by sourceware.org (Postfix) with ESMTPS id ABC1C38515F7 for ; Thu, 31 Mar 2022 22:33:16 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org ABC1C38515F7 Received: by mail-pg1-x533.google.com with SMTP id q19so889472pgm.6 for ; Thu, 31 Mar 2022 15:33:16 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=hgIBI5VWBYBseJ9FRoLw6Hu8nwGakGT/LAKPCncLuok=; b=m4ONqO4z9OzjeN+/P2xnQ5NjiDYyNvPDBS+X8YkmSyUfq3fRlb82eSvOESeSDVM4He NbcWrqellmtGdoUmXvl+bNkOidvpmeJI3gCBRyxDUuJ8P2G+F14LdmBLNrAeoRMjxWKE IbOO18/DbzIKqaAoBgNTk4lc5zBmatEbYQeDf/QR3cET9aaXz0/E3H6hHYNoLmM6el88 6TK6fdt/TJTQCb3O7FhkTUNHi93yONiq6m19KawYXRt8ZC2wgYTxB4S+z7XNj3tz3vzd V1SzkH9/D4cJifQeEi6iAsx/XA0hchlqpnQ5ZsdYRrCbgQcYKXWdFQwHdo176ZuEsICP knCw== X-Gm-Message-State: AOAM530zz1bSRs2SCMe+rUIJJ4sr5qBKgrxZ41LRXM3qJel4woFSUJzy kY+qXdk1mcztts9Kb62il3MGLMJ41pYOTdpxgi0= X-Google-Smtp-Source: ABdhPJw0VW/yKsOAYpbUZ6SwjYGMgLhSB8EJj3dGqv00w/2Jc8DZyPOfNwA5VQO6W9a0uhgyVp/ACeucL7c7YRz7iog= X-Received: by 2002:a63:4a09:0:b0:382:597:3d0d with SMTP id x9-20020a634a09000000b0038205973d0dmr12474937pga.18.1648765995669; Thu, 31 Mar 2022 15:33:15 -0700 (PDT) MIME-Version: 1.0 References: <20220328220936.2724834-1-goldstein.w.n@gmail.com> <7b48ece6-392a-0850-c136-01ab751273ef@linaro.org> <72332228-093c-5186-789f-8616cfb93793@linaro.org> <0198ce75-8a8e-4355-eed1-f69dfb6f40f0@linaro.org> In-Reply-To: From: Noah Goldstein Date: Thu, 31 Mar 2022 17:33:04 -0500 Message-ID: Subject: Re: [PATCH v1 1/2] random-bits: Factor out entropy generating function To: =?UTF-8?Q?Cristian_Rodr=C3=ADguez?= Cc: "Jason A. Donenfeld" , Adhemerval Zanella , GNU C Library , Florian Weimer Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-3.7 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FREEMAIL_FROM, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_PASS, TXREP, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on server2.sourceware.org X-BeenThere: libc-alpha@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Libc-alpha mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Mar 2022 22:33:18 -0000 On Thu, Mar 31, 2022 at 4:57 PM Cristian Rodr=C3=ADguez wrote: > > On Thu, Mar 31, 2022 at 12:32 PM Jason A. Donenfeld wro= te: > > > > Just so we're on the same page here, is this a discussion about > > optimizing https://code.woboq.org/userspace/glibc/include/random-bits.h= .html > > ? > > > > You just need a super fast random uint32_t for some future pthread chan= ges? > > > > If so, I can send a patch to return moderately secure integers here rea= lly fast. > > > > Jason > > That would be great if is better than the current solution. Well v2 of this patch does that for x86. Just curious if I should go forwar= d with the patchset and we can fixup the generic random-bits-entropy.h later or if the solution will be universally optimal.