Source: linux
Severity: normal

Dear Maintainer,

Installing bullseye or bookworm on a Pine64 [0] results in a
system with very low entropy. After some light usage over the
serial console I see:

```
cat /proc/sys/kernel/random/entropy_avail
3
```

This device has a hardware RNG which could be used with rng-tools [1]
to increase entropy but the kernel configuration has it disabled.

Could the `CRYPTO_DEV_SUN8I_CE_PRNG` option be enabled? Then all
users of the A64 SOC could have access to more entropy. A practical
imediate impact is that boot times will decrease for users of
systemd since the systemd-random-seed.service [2] will be able
to gather entropy much faster. Currently on a Pine64
`systemd-analyze blame` shows the random seed service taking 3
seconds on boot.


[0]: https://wiki.debian.org/InstallingDebianOn/PINE64/PINEA64
[1]: https://packages.debian.org/bullseye/rng-tools5
[2]: 
https://manpages.debian.org/bullseye/systemd/systemd-random-seed.service.8.en.html

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
     ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***


-- System Information:
Debian Release: 11.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-9-amd64 (SMP w/1 CPU thread)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Reply via email to