On Wed, Jun 22, 2016 at 5:47 AM, Jason Cooper <jason@xxxxxxxxxxxxxx> wrote: > Hey Kees, > > On Tue, Jun 21, 2016 at 05:46:57PM -0700, Kees Cook wrote: >> Notable problems that needed solving: > ... >> - Reasonable entropy is needed early at boot before get_random_bytes() >> is available. > > This series is targetting x86, which typically has RDRAND/RDSEED > instructions. Are you referring to other arches? Older x86? Also, > isn't this the same requirement for base address KASLR? > > Don't get me wrong, I want more diverse entropy sources available > earlier in the boot process as well. :-) I'm just wondering what's > different about this series vs base address KASLR wrt early entropy > sources. > I think Kees was referring to the refactor I did to get the similar entropy generation than KASLR module randomization. Our approach was to provide best entropy possible even if you have an older processor or under virtualization without support for these instructions. Unfortunately common on companies with a large number of older machines. > thx, > > Jason. Thanks, Thomas -- To unsubscribe from this list: send the line "unsubscribe linux-doc" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html