From mboxrd@z Thu Jan 1 00:00:00 1970 From: "H. Peter Anvin" Subject: Re: [PATCH 0/4] random,x86,kvm: Add and use MSR_KVM_GET_RNG_SEED Date: Wed, 16 Jul 2014 14:36:56 -0700 Message-ID: <53C6F078.4000201@zytor.com> References: <20140716064110.GV18167@minantech.com> <53C62563.6050106@redhat.com> <53C62B68.50702@redhat.com> <53C6A236.7040904@zytor.com> <53C6A362.7090709@redhat.com> <53C6A4A3.1040702@zytor.com> <20140716162133.GO4399@minantech.com> <53C6DEA5.7010203@zytor.com> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Cc: Gleb Natapov , Paolo Bonzini , Daniel Borkmann , kvm list , "Theodore Ts'o" , "linux-kernel@vger.kernel.org" , Kees Cook , X86 ML , Srivatsa Vaddagiri , Raghavendra K T To: Andy Lutomirski Return-path: In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org List-Id: kvm.vger.kernel.org On 07/16/2014 02:32 PM, Andy Lutomirski wrote: > > On the theory that I see no legitimate reason to expose this to guest > user space, I think we shouldn't expose it. If we wanted to add a > get_random_bytes syscall, that would be an entirely different story, > though. > > Should I send v3 as one series or should I split it into host and guest parts? > It doesn't matter... as long as they are separate *patches*. -hpa