[Phoronix] Linux To Try To Opportunistically Initialize /dev/urandom

Written by Michael Larabel in Linux Security on 7 April 2022 at 05:44 AM EDT

“That unifying of /dev/random and /dev/urandom work had to be backed out due to some CPU architectures not having enough source of randomness at boot and no jitter entropy. This was causing problems for Arm (32-bit), Motorola 68000 (M68k), Microblaze, SPARX32, Xtensa, and other niche architectures.

With this patch now in the random.git development tree, it’s trying to opportunistically initialize on /dev/urandom reads. For major, prominent architectures this should allow the same behavior as was desired with the Linux 5.18 RNG changes around urandom.”

-Phoronix

Read more @
https://www.phoronix.com/scan.php?page=news_item&px=Linux-RNG-Opportunistic-urandom