Displaying 10 results from an estimated 10 matches for "derating".
Did you mean:
debating
2014 Aug 15
1
[PULL] virtio-rng: add derating factor for use by hwrng core
...it://git.kernel.org/pub/scm/linux/kernel/git/rafael/linux-pm (2014-08-14 18:13:46 -0600)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/amit/virtio.git rng-queue
for you to fetch changes up to 34679ec7a0c45da8161507e1f2e1f72749dfd85c:
virtio: rng: add derating factor for use by hwrng core (2014-08-15 10:26:01 +0530)
----------------------------------------------------------------
Amit Shah (1):
virtio: rng: add derating factor for use by hwrng core
drivers/char/hw_random/virtio-rng.c | 1 +
1 file changed, 1 insertion(+)
--
1.9.3
2014 Aug 15
1
[PULL] virtio-rng: add derating factor for use by hwrng core
...it://git.kernel.org/pub/scm/linux/kernel/git/rafael/linux-pm (2014-08-14 18:13:46 -0600)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/amit/virtio.git rng-queue
for you to fetch changes up to 34679ec7a0c45da8161507e1f2e1f72749dfd85c:
virtio: rng: add derating factor for use by hwrng core (2014-08-15 10:26:01 +0530)
----------------------------------------------------------------
Amit Shah (1):
virtio: rng: add derating factor for use by hwrng core
drivers/char/hw_random/virtio-rng.c | 1 +
1 file changed, 1 insertion(+)
--
1.9.3
2014 Aug 11
0
[PATCH 1/1] virtio: rng: add derating factor for use by hwrng core
On 08/11/2014 11:49 AM, Amit Shah wrote:
> The khwrngd thread is started when a hwrng device of sufficient
> quality is registered. The virtio-rng device is backed by the
> hypervisor, and we trust the hypervisor to provide real entropy. A
> malicious hypervisor is a scenario that's ruled out, so we are certain
> the quality of randomness we receive is perfectly trustworthy.
2014 Aug 12
1
[PATCH 1/1] virtio: rng: add derating factor for use by hwrng core
On (Mon) 11 Aug 2014 [15:11:03], H. Peter Anvin wrote:
> On 08/11/2014 11:49 AM, Amit Shah wrote:
> > The khwrngd thread is started when a hwrng device of sufficient
> > quality is registered. The virtio-rng device is backed by the
> > hypervisor, and we trust the hypervisor to provide real entropy. A
> > malicious hypervisor is a scenario that's ruled out, so we
2014 Aug 12
0
[PATCH v2 1/1] virtio: rng: add derating factor for use by hwrng core
The khwrngd thread is started when a hwrng device of sufficient
quality is registered. The virtio-rng device is backed by the
hypervisor, and we trust the hypervisor to provide real entropy.
A malicious hypervisor is a scenario that's irrelevant -- such a setup
is bound to cause all sorts of badness, and a compromised hwrng is not
the biggest threat.
Given this, we are certain the quality
2014 Aug 12
1
[PATCH 1/1] virtio: rng: add derating factor for use by hwrng core
On (Mon) 11 Aug 2014 [15:11:03], H. Peter Anvin wrote:
> On 08/11/2014 11:49 AM, Amit Shah wrote:
> > The khwrngd thread is started when a hwrng device of sufficient
> > quality is registered. The virtio-rng device is backed by the
> > hypervisor, and we trust the hypervisor to provide real entropy. A
> > malicious hypervisor is a scenario that's ruled out, so we
2014 Aug 12
0
[PATCH v2 1/1] virtio: rng: add derating factor for use by hwrng core
The khwrngd thread is started when a hwrng device of sufficient
quality is registered. The virtio-rng device is backed by the
hypervisor, and we trust the hypervisor to provide real entropy.
A malicious hypervisor is a scenario that's irrelevant -- such a setup
is bound to cause all sorts of badness, and a compromised hwrng is not
the biggest threat.
Given this, we are certain the quality
2014 Aug 11
2
[PATCH 1/1] virtio: rng: add derating factor for use by hwrng core
The khwrngd thread is started when a hwrng device of sufficient
quality is registered. The virtio-rng device is backed by the
hypervisor, and we trust the hypervisor to provide real entropy. A
malicious hypervisor is a scenario that's ruled out, so we are certain
the quality of randomness we receive is perfectly trustworthy. Hence,
we use 100% for the factor, indicating maximum confidence
2014 Aug 11
2
[PATCH 1/1] virtio: rng: add derating factor for use by hwrng core
The khwrngd thread is started when a hwrng device of sufficient
quality is registered. The virtio-rng device is backed by the
hypervisor, and we trust the hypervisor to provide real entropy. A
malicious hypervisor is a scenario that's ruled out, so we are certain
the quality of randomness we receive is perfectly trustworthy. Hence,
we use 100% for the factor, indicating maximum confidence
2001 Oct 12
2
FLOOR_fromdB_LOOKUP
Hello,
You know, I always worry about the precision
and the float constants... and there is a large
lookup table in the floor1.c ... and I figure out
a way to keep the code size and speed, but
to improve the precision at this lookup table.
(the difference is small, but audible)
Here is the modifications in the floor1.c:
tatic unsigned long FLOOR_fromdB_LOOKUP[256]={