[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+55aFyNqnrM=_5pMgEeL20jVKN7MgWKG52pbaR0FayO=5VuXw@mail.gmail.com>
Date: Mon, 30 Apr 2018 17:01:04 +0000
From: Linus Torvalds <torvalds@...ux-foundation.org>
To: Steven Rostedt <rostedt@...dmis.org>
Cc: Kees Cook <keescook@...omium.org>,
Anna-Maria Gleixner <anna-maria@...utronix.de>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
tcharding <me@...in.cc>
Subject: Re: Hashed pointer issues
On Mon, Apr 30, 2018 at 9:57 AM Linus Torvalds <
torvalds@...ux-foundation.org> wrote:
> Although in *practice* we'd have tons of entropy on any modern development
> CPU too, since any new hardware will have the hardware random number
> generation. Some overly cautious person might not trust it, of course.
In fact, maybe that's the right policy. Avoid a boot-time parameter by just
saying
"if you have hardware random number generation, we can fill entropy
immediately"
No kernel command line needed in practice any more. That's assuming any
kernel developer will have an IvyBridge or newer.
The "I don't trust my hardware" people can still disable that with
"nordrand".
Hmm?
Linus
Powered by blists - more mailing lists