Am Mittwoch, 19. Juli 2017, 03:51:33 CEST schrieb Theodore Ts'o: Hi Theodore, > If the real unpredictability is really coming from the interrupts > changing the state of the CPU microarchitecture, the real question is > how many interrupts do you need before you consider things > "unpredictable" to an adequate level of security? Arguing that we > should turn down the "interrupts per bit of entropy" in > drivers/char/random.c is a much more honest way of having that > discussion. Please answer on the concerns given in [1] which explains that we cannot allow turning that knob in the current implementation. [1] https://www.spinics.net/lists/linux-crypto/msg26316.html Ciao Stephan