virtio-rng backend should use getentropy() syscall when available
Bug #1811758 reported by
dkg
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
QEMU |
Fix Released
|
Wishlist
|
Unassigned |
Bug Description
According to https:/
However, both of these files have suboptimal behavior in one way or another, as documented in `random(7)`. Instead, the default behavior should be to pull the requested octets from the `getrandom()` system call, if available, called with no flags set.
Changed in qemu: | |
status: | Fix Committed → Fix Released |
To post a comment you must log in.
To be clear, the problem with using /dev/urandom as a backend is that it's possible to feed data from an uninitialized pool into the guest.
and the problem with using /dev/random as a backend is that it's possible for a guest to starve the other host (and other guests) of entropy, since it pulls from the blocking pool.
getrandom() only blocks when the CSPRNG is not initialized, otherwise it never blocks. this is the right behavior by default.