On 04/05/2013 12:36 AM, Ingo Molnar wrote: > > * Ingo Molnar <mi...@kernel.org> wrote: > >> >> * Kees Cook <keesc...@chromium.org> wrote: >> >>> This provides routines for selecting a randomized kernel base offset, >>> bounded by e820 details. It tries to use RDRAND and falls back to RDTSC. >>> If "noaslr" is on the kernel command line, no offset will be used. >> >> Would it make sense to also add three other sources of entropy: > > In any case, would it be possible to also mix these bootup sources of > entropy into our regular random pool? > > That would improve random pool entropy on all Linux systems, not just > those that choose to enable kernel-base-address randomization. >
I think we already do at least some of these, but at this point, for any non-RDRAND-capable hardware we could almost certainly do better for any definition of anything at all. RDRAND is obviously the ultimate solution here. -hpa -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/