diff options
author | Dominik Brodowski <linux@dominikbrodowski.net> | 2019-11-06 10:06:13 +0300 |
---|---|---|
committer | Ard Biesheuvel <ardb@kernel.org> | 2019-11-07 12:18:45 +0300 |
commit | 0d95981438c3bdb53cc99b0fb656d24d7a80e1f3 (patch) | |
tree | 7c3dd2d573b2d2210eb4c87b5a62d705bf2da312 /include/linux/efi.h | |
parent | 41e8a7c249bf50f2f719c2ff21ab92be70651f06 (diff) | |
download | linux-0d95981438c3bdb53cc99b0fb656d24d7a80e1f3.tar.xz |
x86: efi/random: Invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table
Invoke the EFI_RNG_PROTOCOL protocol in the context of the x86 EFI stub,
same as is done on arm/arm64 since commit 568bc4e87033 ("efi/arm*/libstub:
Invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table"). Within the stub,
a Linux-specific RNG seed UEFI config table will be seeded. The EFI routines
in the core kernel will pick that up later, yet still early during boot,
to seed the kernel entropy pool. If CONFIG_RANDOM_TRUST_BOOTLOADER, entropy
is credited for this seed.
Signed-off-by: Dominik Brodowski <linux@dominikbrodowski.net>
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Diffstat (limited to 'include/linux/efi.h')
-rw-r--r-- | include/linux/efi.h | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/include/linux/efi.h b/include/linux/efi.h index d87acf62958e..028efa7a9f3b 100644 --- a/include/linux/efi.h +++ b/include/linux/efi.h @@ -1645,6 +1645,8 @@ static inline void efi_enable_reset_attack_mitigation(efi_system_table_t *sys_table_arg) { } #endif +efi_status_t efi_random_get_seed(efi_system_table_t *sys_table_arg); + void efi_retrieve_tpm2_eventlog(efi_system_table_t *sys_table); /* |