summaryrefslogtreecommitdiffstats
path: root/meta/recipes-support/rng-tools/rng-tools/default
Commit message (Collapse)AuthorAgeFilesLines
* rng-tools: Fix crazy defaultsRichard Purdie2017-11-051-2/+1
| | | | | | | | | | | | | | | | | | | | | | | Feeding the output of /dev/urandom into /dev/random is pretty much insane and not something we should encourage. I can't really imagine a scenario where this would be a sensible idea since /dev/urandom if effectively derived from /dev/random. This changes the tool to default to /dev/hwrng which makes much more sense, feeding hardware entropy into the random pool. In the QEMU case, this will feed entropy from the host into the guests which is also what we want. Yes, this change will cause rngd not to start if /dev/hwrng isn't present, but it isn't needed if that isn't so I don't see this as a bad thing. (https://wiki.archlinux.org/index.php/Rng-tools has a section in red which agrees with the above, "this is a really bad idea, since you are simple filling the kernel entropy pool with entropy coming from the kernel itself!") (From OE-Core rev: f1dc9ac46710814c27cae2d22e79c84a9522993a) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* rng-tools: Import recipe from meta-openembeddedSaul Wold2016-02-151-0/+3
Adding this recipe to oe-core will allow it to be used by qemu to provide a way to generate additional entropy needed to fix hangs with getrandom(). Additional kernel config options have already been added to the default qemu kernel configs. [YOCTO #8681] [YOCOT #8816] (From OE-Core rev: 030bc0b2f9636f5cacef29c939b323569cd5673f) Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>