On Thu, Jul 17, 2014 at 10:43 AM, Andrew Honig <[email protected]> wrote: >> + case MSR_KVM_GET_RNG_SEED: >> + get_random_bytes(&data, sizeof(data)); >> + break; > > Should this be rate limited in the interest of conserving randomness? > If there ever is an attack on the prng, this would create very > favorable conditions for an attacker to exploit it.
IMO if the nonblocking pool has a weakness that requires us to conserve its output, then this is the least of our worries. --Andy -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [email protected] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/

