linux: enable RANDOM_TRUST_CPU

Allows the RDRAND instruction to seed the kernel RNG. This should lead
to faster CRNG initialization, since the kernel can use the processors
capabilities directly. This is default enabled in Debian [1] and Fedora
[2] as well.

[1]: https://salsa.debian.org/kernel-team/linux/-/blob/debian/5.10.13-1/debian/config/config#L459
[2]: https://src.fedoraproject.org/rpms/kernel/blob/rawhide/f/kernel-x86_64-fedora.config#_4907

authored by Rouven Czerwinski and committed by Tim Steinbach 368bdd13 3061c1a1

+2
+2
pkgs/os-specific/linux/kernel/common-config.nix
··· 435 435 SECURITY_APPARMOR = yes; 436 436 DEFAULT_SECURITY_APPARMOR = yes; 437 437 438 + RANDOM_TRUST_CPU = yes; # allow RDRAND to seed the RNG 439 + 438 440 MODULE_SIG = no; # r13y, generates a random key during build and bakes it in 439 441 # Depends on MODULE_SIG and only really helps when you sign your modules 440 442 # and enforce signatures which we don't do by default.