Displaying 20 results from an estimated 800 matches similar to: "Efficacy of jitterentropy RNG on qemu-kvm Guests"
2018 Aug 16
1
Re: Efficacy of jitterentropy RNG on qemu-kvm Guests
Martin Kletzander:
> On Fri, Aug 10, 2018 at 08:33:00PM +0000, procmem wrote:
>> Hello. I'm a distro maintainer and was wondering about the efficacy of
>> entropy daemons like haveged and jitterentropyd in qemu-kvm. One of the
>> authors of haveged [0] pointed out if the hardware cycles counter is
>> emulated and deterministic, and thus predictible. He therefore does
2018 Aug 16
0
Re: Efficacy of jitterentropy RNG on qemu-kvm Guests
On Fri, Aug 10, 2018 at 08:33:00PM +0000, procmem wrote:
>Hello. I'm a distro maintainer and was wondering about the efficacy of
>entropy daemons like haveged and jitterentropyd in qemu-kvm. One of the
>authors of haveged [0] pointed out if the hardware cycles counter is
>emulated and deterministic, and thus predictible. He therefore does not
>recommend using HAVEGE on those
2018 Aug 16
0
Re: Efficacy of jitterentropy RNG on qemu-kvm Guests
On Fri, Aug 10, 2018 at 08:33:00PM +0000, procmem wrote:
> Hello. I'm a distro maintainer and was wondering about the efficacy of
> entropy daemons like haveged and jitterentropyd in qemu-kvm. One of the
> authors of haveged [0] pointed out if the hardware cycles counter is
> emulated and deterministic, and thus predictible. He therefore does not
> recommend using HAVEGE on
2016 Jul 29
2
getrandom waits for a long time when /dev/random is insufficiently read from
Am Freitag, 29. Juli 2016, 09:03:45 CEST schrieb Alex Xu:
Hi Alex,
> On Fri, 29 Jul 2016 12:24:27 +0200
>
> Nikos Mavrogiannopoulos <nmav at gnutls.org> wrote:
> > On Fri, Jul 29, 2016 at 7:40 AM, Stephan Mueller
> >
> > <smueller at chronox.de> wrote:
> > > And finally, you have a coding error that is very very common but
> > > fatal
2016 Jul 29
2
getrandom waits for a long time when /dev/random is insufficiently read from
Am Freitag, 29. Juli 2016, 09:03:45 CEST schrieb Alex Xu:
Hi Alex,
> On Fri, 29 Jul 2016 12:24:27 +0200
>
> Nikos Mavrogiannopoulos <nmav at gnutls.org> wrote:
> > On Fri, Jul 29, 2016 at 7:40 AM, Stephan Mueller
> >
> > <smueller at chronox.de> wrote:
> > > And finally, you have a coding error that is very very common but
> > > fatal
2017 May 28
3
Low random entropy
On 05/26/2017 08:35 PM, Leon Fauster wrote:
>> Am 27.05.2017 um 01:09 schrieb Robert Moskowitz <rgm at htt-consult.com>:
>>
>> I am use to low random entropy on my arm boards, not an intel.
>>
>> On my Lenovo x120e,
>>
>> cat /proc/sys/kernel/random/entropy_avail
>>
>> reports 3190 bits of entropy.
>>
>> On my armv7 with
2017 May 28
2
Low random entropy
On 05/28/2017 04:24 AM, Tony Mountifield wrote:
> In article <792718e8-f403-1dea-367d-977b157af82c at htt-consult.com>,
> Robert Moskowitz <rgm at htt-consult.com> wrote:
>>
>> On 05/26/2017 08:35 PM, Leon Fauster wrote:
>>>> Am 27.05.2017 um 01:09 schrieb Robert Moskowitz <rgm at htt-consult.com>:
>>>>
>>>> I am use to low
2017 May 29
1
Low random entropy
On 29/05/17 15:46, Robert Moskowitz wrote:
>
>
> On 05/28/2017 06:57 PM, Rob Kampen wrote:
>> On 28/05/17 23:56, Leon Fauster wrote:
>>>> Am 28.05.2017 um 12:16 schrieb Robert Moskowitz <rgm at htt-consult.com>:
>>>>
>>>>
>>>>
>>>> On 05/28/2017 04:24 AM, Tony Mountifield wrote:
>>>>> In article
2017 May 28
4
Low random entropy
On 28/05/17 23:56, Leon Fauster wrote:
>> Am 28.05.2017 um 12:16 schrieb Robert Moskowitz <rgm at htt-consult.com>:
>>
>>
>>
>> On 05/28/2017 04:24 AM, Tony Mountifield wrote:
>>> In article <792718e8-f403-1dea-367d-977b157af82c at htt-consult.com>,
>>> Robert Moskowitz <rgm at htt-consult.com> wrote:
>>>> On 05/26/2017
2014 Aug 07
2
[PATCH 1/2] rngd: add udev rule to source from hwrng if virtio-rng present
On 08/07/2014 06:08 AM, Amit Shah wrote:
> On KVM guests where the virtio-rng device is available, and set as the
> current rng, this udev rule will start rngd which will feed in the
> host-provided entropy to /dev/random.
>
> Signed-off-by: Amit Shah <amit.shah at redhat.com>
> ---
> 90-virtio-rng.rules | 1 +
> 1 file changed, 1 insertion(+)
> create mode
2014 Aug 07
2
[PATCH 1/2] rngd: add udev rule to source from hwrng if virtio-rng present
On 08/07/2014 06:08 AM, Amit Shah wrote:
> On KVM guests where the virtio-rng device is available, and set as the
> current rng, this udev rule will start rngd which will feed in the
> host-provided entropy to /dev/random.
>
> Signed-off-by: Amit Shah <amit.shah at redhat.com>
> ---
> 90-virtio-rng.rules | 1 +
> 1 file changed, 1 insertion(+)
> create mode
2014 Aug 07
3
[PATCH 0/2] rng-tools: add udev rule for virtio-rng
Hello,
I didn't find a mailing list for rng-tools, so CC'ing the kernel lists
and the last few committers.
The first patch in this series adds a udev rule to start rngd for
guests that have a virtio-rng device available.
The second patch attempts to add autoconf magic to install the udev
rule in the system dirs. However, installing as non-root will
obviously fail. Prefixes are also
2014 Aug 07
3
[PATCH 0/2] rng-tools: add udev rule for virtio-rng
Hello,
I didn't find a mailing list for rng-tools, so CC'ing the kernel lists
and the last few committers.
The first patch in this series adds a udev rule to start rngd for
guests that have a virtio-rng device available.
The second patch attempts to add autoconf magic to install the udev
rule in the system dirs. However, installing as non-root will
obviously fail. Prefixes are also
2017 May 26
3
Low random entropy
I am use to low random entropy on my arm boards, not an intel.
On my Lenovo x120e,
cat /proc/sys/kernel/random/entropy_avail
reports 3190 bits of entropy.
On my armv7 with Centos7 I would get 130 unless I installed rng-tools
and then I get ~1300. SSH into one and it drops back to 30! for a few
minutes. Sigh.
Anyway on my new Zotac nano ad12 with an AMD E-1800 duo core, I am
seeing 180.
2019 Mar 05
1
getrandom() before forking daemon is blocking init system
> On 05 March 2019 at 18:51 William Taylor via dovecot <dovecot at dovecot.org> wrote:
>
>
> On Tue, Mar 05, 2019 at 05:39:28PM +0100, Axel Burri via dovecot wrote:
> > Hello
> >
> > When booting from a slow machine, I can observe dovecot blocking the
> > whole boot process. I traced it down to the getrandom() system call in
> > lib/randgen.c,
2014 Sep 19
3
Standardizing an MSR or other hypercall to get an RNG seed?
On Fri, Sep 19, 2014 at 1:21 PM, Nadav Amit <nadav.amit at gmail.com> wrote:
>
> On Sep 19, 2014, at 9:42 PM, Andy Lutomirski <luto at amacapital.net> wrote:
>
>> On Fri, Sep 19, 2014 at 11:30 AM, Christopher Covington
>> <cov at codeaurora.org> wrote:
>>> On 09/17/2014 10:50 PM, Andy Lutomirski wrote:
>>>> Hi all-
>>>>
2014 Sep 19
3
Standardizing an MSR or other hypercall to get an RNG seed?
On Fri, Sep 19, 2014 at 1:21 PM, Nadav Amit <nadav.amit at gmail.com> wrote:
>
> On Sep 19, 2014, at 9:42 PM, Andy Lutomirski <luto at amacapital.net> wrote:
>
>> On Fri, Sep 19, 2014 at 11:30 AM, Christopher Covington
>> <cov at codeaurora.org> wrote:
>>> On 09/17/2014 10:50 PM, Andy Lutomirski wrote:
>>>> Hi all-
>>>>
2014 Sep 22
3
Standardizing an MSR or other hypercall to get an RNG seed?
On 09/19/2014 05:46 PM, H. Peter Anvin wrote:
> On 09/19/2014 01:46 PM, Andy Lutomirski wrote:
>>>
>>> However, it sounds to me that at least for KVM, it is very easy just to emulate the RDRAND instruction. The hypervisor would report to the guest that RDRAND is supported in CPUID and the emulate the instruction when guest executes it. KVM already traps guest #UD (which would
2014 Sep 22
3
Standardizing an MSR or other hypercall to get an RNG seed?
On 09/19/2014 05:46 PM, H. Peter Anvin wrote:
> On 09/19/2014 01:46 PM, Andy Lutomirski wrote:
>>>
>>> However, it sounds to me that at least for KVM, it is very easy just to emulate the RDRAND instruction. The hypervisor would report to the guest that RDRAND is supported in CPUID and the emulate the instruction when guest executes it. KVM already traps guest #UD (which would
2018 Feb 28
3
Libvirt supported qemu-ga commands
Where can I find the full list of libvirt supported qemu-ga commands?
The docs [0] imply virDomainQemuAgentCommand bypasses libvirt and is not
recommended.
I am looking to pass suspend/resume events from the host to the guest
and then have the guest act on this internally. Your help is appreciated.
[0] https://wiki.libvirt.org/page/Qemu_guest_agent