On Thu, Jul 17, 2014 at 10:43 AM, Andrew Honig <[email protected]> wrote:
>> +       case MSR_KVM_GET_RNG_SEED:
>> +               get_random_bytes(&data, sizeof(data));
>> +               break;
>
> Should this be rate limited in the interest of conserving randomness?
> If there ever is an attack on the prng, this would create very
> favorable conditions for an attacker to exploit it.

IMO if the nonblocking pool has a weakness that requires us to
conserve its output, then this is the least of our worries.

--Andy
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to