On Thu, Jul 17, 2014 at 10:43 AM, Andrew Honig <ahonig@xxxxxxxxxx> wrote: >> + case MSR_KVM_GET_RNG_SEED: >> + get_random_bytes(&data, sizeof(data)); >> + break; > > Should this be rate limited in the interest of conserving randomness? > If there ever is an attack on the prng, this would create very > favorable conditions for an attacker to exploit it. IMO if the nonblocking pool has a weakness that requires us to conserve its output, then this is the least of our worries. --Andy -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html