Skip to content

kernel: enable RANDOM_TRUST_BOOTLOADER on >= 5.4#165355

Merged
grahamc merged 1 commit intomasterfrom
random-trust-bootloader
Mar 24, 2022
Merged

kernel: enable RANDOM_TRUST_BOOTLOADER on >= 5.4#165355
grahamc merged 1 commit intomasterfrom
random-trust-bootloader

Conversation

@grahamc
Copy link
Member

@grahamc grahamc commented Mar 23, 2022

Some bootloaders can provide entropy to increase the kernel's initial device randomness.

This allows, for example, EFI to provide 64 bytes. In general my opinion is an attacker
who can manipulate the random seed sufficiently to cause problems likely has other,
more direct approaches at their disposal as well.

Description of changes
Things done
  • Built on platform(s)
    • x86_64-linux
    • aarch64-linux
    • x86_64-darwin
    • aarch64-darwin
  • For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
  • Tested, as applicable:
  • Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
  • Tested basic functionality of all binary files (usually in ./result/bin/)
  • 22.05 Release Notes (or backporting 21.11 Release notes)
    • (Package updates) Added a release notes entry if the change is major or breaking
    • (Module updates) Added a release notes entry if the change is significant
    • (Module addition) Added a release notes entry if adding a new NixOS module
    • (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes
  • Fits CONTRIBUTING.md.

@github-actions github-actions bot added the 6.topic: kernel The Linux kernel label Mar 23, 2022
@grahamc grahamc requested a review from NeQuissimus March 23, 2022 02:03
> Some bootloaders can provide entropy to increase the kernel's initial device randomness.

This allows, for example, EFI to provide 64 bytes. In general my opinion is an attacker
who can manipulate the random seed sufficiently to cause problems likely has other,
more direct approaches at their disposal as well.
@grahamc grahamc force-pushed the random-trust-bootloader branch from 166849d to a5c2827 Compare March 23, 2022 02:05
@TredwellGit
Copy link
Member

Is there an option to disable this without recompiling the kernel? As far as I am aware, the kernel already uses this as an entropy source without this being set and this option means that it completely trusts the UEFI random number generator to be not compromised and also be correct which is problematic because it can't be audited. I would actually advocate for the opposite options to be set -- we should explicitly not trust any unauditable random source. And this is not a theoretical concern; for example, there was recently an issue with AMD CPUs where RDRAND always returned 0xFFFFFFFFFFFFFFFF as a random output.

@ofborg ofborg bot added 10.rebuild-darwin: 0 This PR does not cause any packages to rebuild on Darwin. 10.rebuild-linux: 501+ This PR causes many rebuilds on Linux and should normally target the staging branches. 10.rebuild-linux: 2501-5000 This PR causes many rebuilds on Linux and should target the staging branches. labels Mar 23, 2022
@mweinelt
Copy link
Member

mweinelt commented Mar 23, 2022

Apart from actual defects like this the bootloader is a crucial part of the bringup that if we can't trust we certainly have bigger problems. This was introduced in torvalds/linux@428826f and I don't see any obvious runtime switch you could toggle.

The bigger question is whether it would be the only source, and I don't think that is the case. Also we already trust the CPU RNG which we can't audit either, so the way I see it is: the more RNG sources the merrier.

@grahamc
Copy link
Member Author

grahamc commented Mar 23, 2022

Is there an option to disable this without recompiling the kernel?

No. CONFIG_RANDOM_TRUST_CPU can be disabled with the random.trust_cpu cmdarg, but I'm sure you can imagine the bootloader gets to pick what arguments to send you, so an option to disable it isn't so helpful security-wise.

However, my understanding is measured boot measures if the bootloader's source is used, and policy decision can be made onthat.

As far as I am aware, the kernel already uses this as an entropy source without this being set and this option means that it completely trusts the UEFI random number generator to be not compromised and also be correct which is problematic because it can't be audited.

Not quite. I believe it only uses the bootloader's random seed as a part of the seeding of the RNG if this option is set, and it appears to only take 8 bytes:

/*
 * Handle random seed passed by bootloader.
 * If the seed is trustworthy, it would be regarded as hardware RNGs. Otherwise
 * it would be regarded as device data.
 * The decision is controlled by CONFIG_RANDOM_TRUST_BOOTLOADER.
 */
void add_bootloader_randomness(const void *buf, size_t size)
{
	if (IS_ENABLED(CONFIG_RANDOM_TRUST_BOOTLOADER))
		add_hwgenerator_randomness(buf, size, size * 8);

https://git.kernel.org/pub/scm/linux/kernel/git/crng/random.git/tree/drivers/char/random.c#n1145

I would actually advocate for the opposite options to be set -- we should explicitly not trust any unauditable random source.

This is used as part of the generation of the initial state, and I don't think it is an exclusive source. With the exception of software bugs in the bootloader, can you imagine a scenario where this can go badly? I have a hard time imagining a case where it is worse than useless where an attacker isn't already extremely privileged to the point the RNG doesn't matter.

@grahamc
Copy link
Member Author

grahamc commented Mar 23, 2022

Yes, the RDRAND issues were concerning, and it is very likely future hardware and software will have similar issues again. I don't yet consider that to be a compelling argument against using the data as part of a collection of random sources.

@TredwellGit
Copy link
Member

My point is that you can't tell if there are bugs in unauditable random sources because they can provide output that is statistically random but in reality are not actually secure. There is also a continued effort to introduce intentionally malicious random number generators and that can be done in such a way that only the attacker is aware.

I don't trust these sources and already set random.trust_cpu=off and I really don't like an option like this where I have to recompile the kernel to change the setting.

@TredwellGit
Copy link
Member

I also don't like these options because they blanket trust all CPU and bootloader random implementations even when there are implementations that are known to be broken in common use.

@grahamc
Copy link
Member Author

grahamc commented Mar 23, 2022

It still isn't clear to me that your concerns hold up for 99% of use cases. I grant that there maybe such scenarios, but I don't believe our default kernel configuration should cater to them. Yes, AMD's RDRAND SNAFU was bad, but the kernel team has addressed it on their own. Regarding a hardware manufacturer compromising an RNG, I quite like what Theodore Ts'o had to say about this:

ultimately we have to trust the general purpose CPU. If the CPU is actively conspiring against you, there really is no hope.

Since cryptography and RNGs are such complex and delicate fields of study, I'm very cautious about reading much into unsubstantiated claims and scary hypotheticals. I'm also inclined to put my faith in the leaders of the field. In this case, Jason Donenfeld who brought this configuration to my attention.

As I mentioned earlier, I don't think an attack is very likely to exist which can meaningfully impact the early boot environment but is also predicated on compromising the RNG in some specific way. That, plus the ability to detect the usage of the data and prohibit it by policy using measured boot, and the ability to disable it and easily recompile the kernel, I'm quite inclined to apply this option.

@zx2c4
Copy link
Contributor

zx2c4 commented Mar 23, 2022

https://lore.kernel.org/lkml/[email protected]/ That might help with @TredwellGit's concerns.

zx2c4-bot pushed a commit to zx2c4/linux-rng that referenced this pull request Mar 23, 2022
If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Dominik Brodowski <[email protected]>
Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
@danderson
Copy link
Contributor

+1 to Graham's analysis. If the firmware is compromised, there are many way easier and more powerful ways to compromise userspace than to futz with RNG init in the hopes that you have a better chance of predicting some early random bytes (prior to other system activity contributing more entropy and scrambling the state again). Doubly so if both TRUST_CPU and TRUST_BOOTLOADER are enabled, because now you need many different parties to have colluded and somehow kept it perfectly secret all these years.

Folks who have "I don't trust the hardware or firmware I run on" in their threat model can recompile their kernel if they feel that strongly about it. But should also reexamine their threat model, because really boot randomness is the least of anyone's worries if that's the starting point.

zx2c4-bot pushed a commit to zx2c4/linux-rng that referenced this pull request Mar 23, 2022
If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
zx2c4-bot pushed a commit to zx2c4/linux-rng that referenced this pull request Mar 23, 2022
If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
zx2c4-bot pushed a commit to zx2c4/linux-rng that referenced this pull request Mar 24, 2022
If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
zx2c4-bot pushed a commit to zx2c4/linux-rng that referenced this pull request Mar 24, 2022
If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
@grahamc grahamc merged commit e492708 into master Mar 24, 2022
@grahamc grahamc deleted the random-trust-bootloader branch March 24, 2022 13:15
mylove90 pushed a commit to mylove90/pc_ginkgo that referenced this pull request Dec 1, 2023
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
mylove90 pushed a commit to mylove90/pc_ginkgo that referenced this pull request Dec 1, 2023
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
mylove90 pushed a commit to mylove90/pc_ginkgo that referenced this pull request Dec 2, 2023
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
roniwae pushed a commit to roniwae/MiuiKernel that referenced this pull request Dec 15, 2023
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
roniwae pushed a commit to roniwae/komplit that referenced this pull request Jan 19, 2024
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
makinbacon21 pushed a commit to NX-Development/android_kernel_nvidia_kernel that referenced this pull request Jan 27, 2024
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
alextrack2013 pushed a commit to alextrack2013/android_kernel_realme_sm8150 that referenced this pull request Feb 10, 2024
…rust toggle

commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Cyber Knight <[email protected]>
shygosh pushed a commit to shygosh/kernel_realme_r5t that referenced this pull request Mar 22, 2024
…rust toggle

commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Cyber Knight <[email protected]>
Amritorock pushed a commit to Amritorock/kernel_realme_r5t that referenced this pull request Mar 24, 2024
…rust toggle

commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Cyber Knight <[email protected]>
roniwae pushed a commit to roniwae/komplit that referenced this pull request Apr 11, 2024
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
Huawei-Dev pushed a commit to Huawei-Dev/android_kernel_huawei_hi3660 that referenced this pull request Apr 13, 2024
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
Huawei-Dev pushed a commit to Huawei-Dev/android_kernel_huawei_hi3660 that referenced this pull request May 21, 2024
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
Huawei-Dev pushed a commit to Huawei-Dev/android_kernel_huawei_hi3660 that referenced this pull request May 21, 2024
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
Huawei-Dev pushed a commit to Huawei-Dev/android_kernel_huawei_hi3660 that referenced this pull request May 23, 2024
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
RahifM pushed a commit to RahifM/android_kernel_xiaomi_sdm845 that referenced this pull request Jun 2, 2024
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
Frostleaft07 pushed a commit to Frostleaft07/android_kernel_realme_mt6765 that referenced this pull request Jul 10, 2024
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
deflamingq pushed a commit to deflamingq/kernel_asus_sdm660 that referenced this pull request Nov 5, 2024
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
Andrey0800770 pushed a commit to Andrey0800770/samsung_sdm845-kernel that referenced this pull request Dec 25, 2024
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
Huawei-Dev pushed a commit to Huawei-Dev/android_kernel_huawei_kirin710 that referenced this pull request Jan 22, 2025
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
somestupidgirl pushed a commit to somestupidgirl/exynos-linux-stable that referenced this pull request Jan 27, 2025
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
somestupidgirl pushed a commit to somestupidgirl/exynos-linux-stable that referenced this pull request Jan 29, 2025
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
IamCOD3X pushed a commit to IamCOD3X/android_kernel_xiaomi_onclite that referenced this pull request Feb 21, 2025
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
dek0der pushed a commit to dek0der/kernel_realme_RMX3031 that referenced this pull request Apr 19, 2025
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
neel0210 pushed a commit to neel0210/kernel_samsung_universal9611 that referenced this pull request May 11, 2025
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
eun0115 pushed a commit to eun0115/android_kernel_samsung_sm7150 that referenced this pull request Jun 24, 2025
…rust toggle

commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Cyber Knight <[email protected]>
Frostleaft07 pushed a commit to Frostleaft07/realmeC12_realmeC15_AndroidR-kernel-source that referenced this pull request Aug 15, 2025
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
theshaenix pushed a commit to theshaenix/ShadowBladeX that referenced this pull request Dec 16, 2025
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
RaryanaS pushed a commit to RaryanaS/android_kernel_realme_sm7125 that referenced this pull request Feb 1, 2026
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
RaryanaS pushed a commit to RaryanaS/android_kernel_realme_sm7125 that referenced this pull request Feb 1, 2026
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
RaryanaS pushed a commit to RaryanaS/android_kernel_realme_sm7125 that referenced this pull request Feb 11, 2026
commit d97c68d178fbf8aaaf21b69b446f2dfb13909316 upstream.

If CONFIG_RANDOM_TRUST_CPU is set, the RNG initializes using RDRAND.
But, the user can disable (or enable) this behavior by setting
`random.trust_cpu=0/1` on the kernel command line. This allows system
builders to do reasonable things while avoiding howls from tinfoil
hatters. (Or vice versa.)

CONFIG_RANDOM_TRUST_BOOTLOADER is basically the same thing, but regards
the seed passed via EFI or device tree, which might come from RDRAND or
a TPM or somewhere else. In order to allow distros to more easily enable
this while avoiding those same howls (or vice versa), this commit adds
the corresponding `random.trust_bootloader=0/1` toggle.

Cc: Theodore Ts'o <[email protected]>
Cc: Graham Christensen <[email protected]>
Reviewed-by: Ard Biesheuvel <[email protected]>
Reviewed-by: Dominik Brodowski <[email protected]>
Link: NixOS/nixpkgs#165355
Signed-off-by: Jason A. Donenfeld <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

6.topic: kernel The Linux kernel 10.rebuild-darwin: 0 This PR does not cause any packages to rebuild on Darwin. 10.rebuild-linux: 501+ This PR causes many rebuilds on Linux and should normally target the staging branches. 10.rebuild-linux: 2501-5000 This PR causes many rebuilds on Linux and should target the staging branches.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants