Re: [PATCH] random: mix all saved registers into entropy pool
From: JÃrn Engel
Date: Mon May 19 2014 - 19:20:24 EST
On Mon, 19 May 2014 16:05:06 -0700, H. Peter Anvin wrote:
> On 05/19/2014 03:39 PM, JÃrn Engel wrote:
> >
> > I would feel fairly confident giving this .25 bits of entropy per
> > event. With 40% unique hashes and assuming at most 1 bit of entropy
> > for a unique hash, that is a fairly conservative underestimate.
>
> Sure, but that is for a specific workload.
The workload is called boot. That is one of the two critical ones -
the other being a cloned VM. If we can gather enough entropy during
boot and somehow avoid the cloned VM problem, we have won. No more
need to feed in entropy from the previous run, which on many embedded
systems won't happen anyway.
If you complained about the limited selection of hardware I tested on,
you would be right. So far it has been x86 kvm and an x86 notebook.
It would be great to get numbers for some embedded system with arm or
mips as well.
JÃrn
--
When in doubt, punt. When somebody actually complains, go back and fix it...
The 90% solution is a good thing.
-- Rob Landley
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/