@@ -556,8 +556,6 @@ config SUNXI_BS83B16C
556556 the driver, it is necessary to ensure that the MCU has burned the
557557 corresponding firmware.
558558
559- endmenu
560-
561559config RANDOM_TRUST_CPU
562560 bool "Initialize RNG using CPU RNG instructions"
563561 default y
@@ -581,11 +579,21 @@ config RANDOM_TRUST_BOOTLOADER
581579 bool "Initialize RNG using bootloader-supplied seed"
582580 default y
583581 help
584- Some bootloaders can provide entropy to increase the kernel's initial
585- device randomness. Say Y here to assume the entropy provided by the
586- booloader is trustworthy so it will be added to the kernel's entropy
587- pool. Otherwise, say N here so it will be regarded as device input that
588- only mixes the entropy pool.
582+ Initialize the RNG using a seed supplied by the bootloader or boot
583+ environment (e.g. EFI or a bootloader-generated device tree). This
584+ seed is not used directly, but is rather hashed into the main input
585+ pool, and this happens regardless of whether or not this option is
586+ enabled. Instead, this option controls whether the seed is credited
587+ and hence can initialize the RNG. Additionally, other sources of
588+ randomness are always used, regardless of this setting. Enabling
589+ this implies trusting that the bootloader can supply high quality and
590+ non-backdoored seeds.
591+
592+ Say Y here unless you have reason to mistrust your bootloader or
593+ believe its RNG facilities may be faulty. This may also be configured
594+ at boot time with "random.trust_bootloader=on/off".
595+
596+ endmenu
589597
590598source "drivers/char/sunxi_g2d/Kconfig"
591599source "drivers/char/sunxi-di/Kconfig"
0 commit comments