I was unsure about the purported forward-security-breakage claims because I don't know how to validate those, but I seem to recall (from personal knowledge and the paper) that the kernel does an SHA1 hash of the contents of the pool and the current cycle-counter when reading, uses that as input for the next pool state and returns it as /dev/random output. Since the exact cycle-counter value is never exposed outside the kernel and only a small window of the previous
Are you sure? For vsyscalls to work, rdtsc has to be available from
userspace, no?