openwrt/target/linux/generic
Hauke Mehrtens 2bab7d273e kernel: Initialize RNG using CPU RNG and bootloader
This activates the following kernel options by default:
* CONFIG_RANDOM_TRUST_CPU
* CONFIG_RANDOM_TRUST_BOOTLOADER

With these option Linux will also use data from the CPU RNG e.g. RDRAND
and the bootloader to initialize the Linux RNG if such sources are
available.
These random bits are used in addition to the other sources, no other
sources are getting deactivated. I read that the Chacha mixer isn't
vulnerable to injected entropy, so this should not be a problem even if
these sources might inject bad random data.

The Linux kernel suggests to activate both options, Debian also
activates them. This does not increase kernel code size.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2023-04-29 12:35:44 +02:00
..
backport-5.10 generic: 5.10: replace ramips AR8033 fiber patch with 5.18 patches 2023-04-22 17:21:29 +02:00
backport-5.15 generic: Convert incorrect generic/5.15 patches again 2023-04-27 16:18:44 +01:00
files kernel: ssb: fallback-sprom: check bustype 2023-04-24 21:02:29 +02:00
hack-5.10 kernel: add bcma/ssb fallback SPROM support 2023-04-23 12:18:35 +02:00
hack-5.15 generic: Convert incorrect generic/5.15 patches again 2023-04-27 16:18:44 +01:00
image target: use SPDX license identifiers on Makefiles 2021-02-10 15:47:18 +01:00
other-files initramfs: switch to tmpfs to fix ujail 2020-11-27 01:23:43 +00:00
pending-5.10 generic: 5.10: replace pending 730-net-phy-at803x-fix... with upstream 2023-04-22 17:21:28 +02:00
pending-5.15 kernel: net: phy: realtek: fix NULL pointer dereference 2023-04-24 03:16:26 +01:00
config-5.10 kernel: Initialize RNG using CPU RNG and bootloader 2023-04-29 12:35:44 +02:00
config-5.15 kernel: Initialize RNG using CPU RNG and bootloader 2023-04-29 12:35:44 +02:00
config-filter kernel: filter out pahole version 2023-03-29 17:36:19 +02:00
PATCHES kernel: update PATCHES with a stricter policy 2013-07-09 20:52:07 +00:00