117
submitted 2 months ago* (last edited 2 months ago) by A_norny_mousse@feddit.org to c/linux@programming.dev

That's all. I just found this in a random script. Generates a random UUID every time it's called. I didn't know.

Of course I can also use uuidgen or pipe /dev/(u)random into something to get a random alphanumeric string - but this is built right into the kernel!

In /proc/sys/kernel/random/, there's also boot_id which ~~seems to do the same~~ is static, and some tweakable parameters.

❤️🐧

all 37 comments
sorted by: hot top controversial new old
[-] Redjard@lemmy.dbzer0.com 16 points 2 months ago

boot_id seems to be static, probably set at boot.
So don't use it for a random uuid.

[-] nibbler@discuss.tchncs.de 4 points 2 months ago

it's fine as long as you reboot before each call

[-] A_norny_mousse@feddit.org 1 points 2 months ago

Oops you’re correct. Editing OP.

[-] bleistift2@sopuli.xyz 14 points 2 months ago

That’s what you get when you define a file system as “a system that names things”.

[-] timhh@programming.dev 10 points 2 months ago

Yeah but please don't actually use this. Use a proper UUID library that works cross-platform and lets you choose the UUID type and can be seeded etc.

[-] A_norny_mousse@feddit.org 4 points 2 months ago* (last edited 2 months ago)

Can you explain?
Use for what?
Also it is being seeded, according to the file urandom_min_reseed_secs which is also writeable. Here are the other files:

-r--r--r-- 1 root root 0 25. 5. 11:13 boot_id
-r--r--r-- 1 root root 0 25. 5. 11:19 entropy_avail
-r--r--r-- 1 root root 0 25. 5. 11:19 poolsize
-rw-r--r-- 1 root root 0 25. 5. 11:19 urandom_min_reseed_secs
-r--r--r-- 1 root root 0 25. 5. 11:19 uuid
-rw-r--r-- 1 root root 0 25. 5. 11:19 write_wakeup_threshold

edit: the type is always DCE/random

[-] timhh@programming.dev 1 points 1 month ago

There are a few reasons you shouldn't use this in proper programs. If you're the sort of person that thinks hacky Bash scripts are acceptable then sure, use it there.

  1. It isn't cross-platform. Not available on Mac/Windows.
  2. There are several types of UUID with different properties. This doesn't let you choose which one to use.
  3. To make programs deterministic (really useful for testing!) you want to be able to seed all their randomness with a specific seed so that it generates the same UUID each time you run it. (Obviously in normal use you would use a random seed.)
[-] kionite231@lemmy.ca 6 points 2 months ago

Thank you so much for sharing this!

[-] notfromhere@lemmy.ml 6 points 2 months ago

I’ve used this in some bash scripts, very useful!

[-] A_norny_mousse@feddit.org 2 points 2 months ago* (last edited 2 months ago)

That's what I mean. No more searching for ways to create shell-friendly randomness ($RANDOM does not always cut it).

[-] lnxtx@feddit.nl 5 points 2 months ago* (last edited 2 months ago)

Interesting,
non-scientific speed test:

kernel 6.1.0-37-amd64:

$ time for i in $(seq 1 100000); do cat /proc/sys/kernel/random/uuid > /dev/null; done

real    3m53,388s
user    1m37,366s
sys     2m13,847s

$ for i in $(seq 1 100000); do cat /proc/sys/kernel/random/uuid ; done | wc -l
100000

vs. uuid 1.6.2-1.5+b11:

$ time for i in $(seq 1 100000); do uuid -v4 > /dev/null; done

real    4m44,854s
user    1m37,867s
sys     3m4,414s

$ for i in $(seq 1 100000); do uuid -v4 ; done | wc -l
100000

EDIT: I'm blind (wrong result).

[-] clif@lemmy.world 5 points 2 months ago

This is awesome. Thank you

[-] pelya@lemmy.world 4 points 2 months ago

Works in Termux on Android

[-] sorrybookbroke@sh.itjust.works 3 points 2 months ago

My guy you've just given me the same sense of wonder you got yourself. Fuck man I love linux

[-] A_norny_mousse@feddit.org 3 points 2 months ago

When writing shell scripts that run in a loop I always look for files in /sys or /proc before using standard utilities. There's a lot

  • /proc/mounts instead of the mount command
  • /sys/class/..../backlight to influence screen brightness
  • /sys/class/net to get info and stats about interfaces
  • ....

Someone should make a comprehensive list I guess.

[-] Hamartiogonic@sopuli.xyz -1 points 2 months ago

See also: /dev/null

It’s basically a black hole where you can throw anything.

[-] DaPorkchop_@lemmy.ml 10 points 2 months ago

Yes, but what if it were a subscription? May I present: /dev/null-as-a-Service.

[-] A_norny_mousse@feddit.org 1 points 2 months ago

The most secure Bitcoin endpoint yet!

lol.

Okay, let’s be honest, it’s basically a crappy Pentium 4 box with Debian and nginx installed.

[-] victorz@lemmy.world 9 points 2 months ago* (last edited 2 months ago)
cat /proc/sys/kernel/random/uuid > /dev/null
[-] DaPorkchop_@lemmy.ml 16 points 2 months ago

Would have to be cat /proc/sys/kernel/random/uuid > /dev/null

You can't pipe to a file, only to programs, and since /dev/null isn't an executable your command will simply give an error.

To make it more clear, consider using dd, which lets you explicitly specify an input and output file. For example: dd if=/proc/sys/kernel/random/uuid of=/dev/sda1 wait shit that wasn't the right output oh god oh fu

[-] sixtoe@lemmy.blahaj.zone 2 points 2 months ago

i saw this and came to do THE THING but you beat me too it. GOOD ANYA

[-] Redjard@lemmy.dbzer0.com 2 points 2 months ago

dd is just cp but more confusing here.
The only thing dd can do that cp can't is stop ahead of time, which only really matters for infinite files like /dev/random

cp /proc/sys/kernel/random/uuid /dev/sda

[-] victorz@lemmy.world 1 points 2 months ago* (last edited 2 months ago)

Thanks, I'm overworked lately.

lol, the last part

[-] A_norny_mousse@feddit.org 1 points 2 months ago

dd if=/proc/sys/kernel/random/uuid of=/dev/sda1

Peanuts. Real men do dd if=/proc/sys/kernel/random/uuid of=/dev/sda

[-] A_norny_mousse@feddit.org 3 points 2 months ago* (last edited 2 months ago)

while :; do cat /proc/sys/kernel/random/uuid > /dev/null; done

edit: on all cores for maximum "efficiency"

[-] henfredemars@infosec.pub 3 points 2 months ago

The information will be evenly distributed upon its surface and some believe one day it will be be radiated back out into the rest of the system.

[-] Hamartiogonic@sopuli.xyz 2 points 2 months ago

That's a horrifying concept. Better not think about it.

[-] Hamartiogonic@sopuli.xyz 1 points 2 months ago

That reminds me of the CPU stress test I ran many years ago.

dd if=/dev/random of=/dev/null

If you have 8 cores, just open 8 terminals, and run that code in each of them.

[-] YerbaYerba@lemm.ee 4 points 2 months ago

/dev/urandom should stress the CPU more. /dev/random can be entropy limited

[-] lime@feddit.nu 3 points 2 months ago* (last edited 2 months ago)
for i in {1..n}  # where n == number of cores
do
  dd if=/dev/urandom of=/dev/null &
done

# to stop:
jobs -p | xargs kill
[-] Hamartiogonic@sopuli.xyz 1 points 2 months ago

Oh yeah. This looks like a much better way to do it. My solution is pretty bare bones by comparison.

[-] lime@feddit.nu 1 points 2 months ago

the advantage of yours is that you can actually see the performance number afterwards.

[-] victorz@lemmy.world 2 points 2 months ago

Can you guarantee that each process will run on its own core?

[-] Hamartiogonic@sopuli.xyz 2 points 2 months ago

Absolutely not, quite the opposite actually. However, the end result is close to 100% CPU load, which is good enough for some purposes. Let’s say you want to test the performance of your CPU cooler, or overclock stability, this should good enough. There are also dedicated tools for people with more advanced needs.

this post was submitted on 24 May 2025
117 points (97.6% liked)

Linux

8577 readers
451 users here now

A community for everything relating to the GNU/Linux operating system (except the memes!)

Also, check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS