diff options
author | Hsin-Yi Wang <hsinyi@chromium.org> | 2019-08-23 09:24:51 +0300 |
---|---|---|
committer | Will Deacon <will@kernel.org> | 2019-08-23 18:39:26 +0300 |
commit | 428826f5358c922dc378830a1717b682c0823160 (patch) | |
tree | c6487033843f52641f669cd90275466f4fff16f9 /drivers/usb/common | |
parent | e112b032a72c78f15d0c803c5dc6be444c2e6c66 (diff) | |
download | linux-428826f5358c922dc378830a1717b682c0823160.tar.xz |
fdt: add support for rng-seed
Introducing a chosen node, rng-seed, which is an entropy that can be
passed to kernel called very early to increase initial device
randomness. Bootloader should provide this entropy and the value is
read from /chosen/rng-seed in DT.
Obtain of_fdt_crc32 for CRC check after early_init_dt_scan_nodes(),
since early_init_dt_scan_chosen() would modify fdt to erase rng-seed.
Add a new interface add_bootloader_randomness() for rng-seed use case.
Depends on whether the seed is trustworthy, rng seed would be passed to
add_hwgenerator_randomness(). Otherwise it would be passed to
add_device_randomness(). Decision is controlled by kernel config
RANDOM_TRUST_BOOTLOADER.
Signed-off-by: Hsin-Yi Wang <hsinyi@chromium.org>
Reviewed-by: Stephen Boyd <swboyd@chromium.org>
Reviewed-by: Rob Herring <robh@kernel.org>
Reviewed-by: Theodore Ts'o <tytso@mit.edu> # drivers/char/random.c
Signed-off-by: Will Deacon <will@kernel.org>
Diffstat (limited to 'drivers/usb/common')
0 files changed, 0 insertions, 0 deletions