From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by mx.groups.io with SMTP id smtpd.web12.7636.1668088087829444963 for ; Thu, 10 Nov 2022 05:48:08 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Taf6OUAF; spf=pass (domain: kernel.org, ip: 139.178.84.217, mailfrom: ardb@kernel.org) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 4F4C7617B6; Thu, 10 Nov 2022 13:48:07 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C56ECC43153; Thu, 10 Nov 2022 13:48:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1668088086; bh=ML7b4jSEA8oyaVQPwZiyeHRZWTCyJUJ5yAbWahqFlUQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Taf6OUAF0ddFG3Mpu63wCrZmxx2E36l9JKRHYfvPGuOde/787ADzRkwJkqnMUnRL8 9lJpLavPSZsO3w6CWaJYt7kQ2IPQSUKm0fvlq8qJXuAvfFaAGWrMnWaAyPKV1sHnGN rNop/50mLN3PSgFMe+qARJTF1kD+WcudHqlMfYS5NLuAKL0VIann1BeHYQJxGuwzhN WWV5Z86v/7CcjkK+g/JxxWrmfxF5z5gyypUVZ/3+y39tUJ76sjyahO5/8E1HG5QH9T IrMNV82jrHDLjaxq1+1pLhFvYvk1MqdhzjOBXvq/OX2YHSAElP0MtJg/pI4LYdHkRB enyGjE8s4XjYw== From: "Ard Biesheuvel" To: devel@edk2.groups.io Cc: Ard Biesheuvel , Liming Gao , Rebecca Cran , Pierre Gondois , Leif Lindholm , Sami Mujawar , Gerd Hoffmann , "Jason A . Donenfeld" Subject: [PATCH 3/3] OvmfPkg/OvmfX86: Enable RDRAND based EFI_RNG_PROTOCOL implementation Date: Thu, 10 Nov 2022 14:47:38 +0100 Message-Id: <20221110134738.3798618-4-ardb@kernel.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20221110134738.3798618-1-ardb@kernel.org> References: <20221110134738.3798618-1-ardb@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Expose the EFI_RNG_PROTOCOL based on RdRand, so that we don't have to rely on QEMU providing a virtio-rng device in order to implement this protocol. Signed-off-by: Ard Biesheuvel --- OvmfPkg/OvmfPkgIa32.dsc | 1 + OvmfPkg/OvmfPkgIa32.fdf | 1 + OvmfPkg/OvmfPkgIa32X64.dsc | 1 + OvmfPkg/OvmfPkgIa32X64.fdf | 1 + OvmfPkg/OvmfPkgX64.dsc | 1 + OvmfPkg/OvmfPkgX64.fdf | 1 + 6 files changed, 6 insertions(+) diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc index e9ba491237ae..18c1e7255812 100644 --- a/OvmfPkg/OvmfPkgIa32.dsc +++ b/OvmfPkg/OvmfPkgIa32.dsc @@ -941,6 +941,7 @@ [Components] }=0D !endif=0D =0D + SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf=0D !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE=0D SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDx= e.inf=0D OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf=0D diff --git a/OvmfPkg/OvmfPkgIa32.fdf b/OvmfPkg/OvmfPkgIa32.fdf index 7023ade8cebe..34f27ca832bc 100644 --- a/OvmfPkg/OvmfPkgIa32.fdf +++ b/OvmfPkg/OvmfPkgIa32.fdf @@ -248,6 +248,7 @@ [FV.DXEFV] INF OvmfPkg/LsiScsiDxe/LsiScsiDxe.inf=0D !endif=0D =0D + INF SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf=0D !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE=0D INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootCon= figDxe.inf=0D !endif=0D diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc index af566b953f36..e9a199c9f490 100644 --- a/OvmfPkg/OvmfPkgIa32X64.dsc +++ b/OvmfPkg/OvmfPkgIa32X64.dsc @@ -955,6 +955,7 @@ [Components.X64] }=0D !endif=0D =0D + SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf=0D !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE=0D SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDx= e.inf=0D OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf=0D diff --git a/OvmfPkg/OvmfPkgIa32X64.fdf b/OvmfPkg/OvmfPkgIa32X64.fdf index 80de4fa2c0df..33cc163e596e 100644 --- a/OvmfPkg/OvmfPkgIa32X64.fdf +++ b/OvmfPkg/OvmfPkgIa32X64.fdf @@ -249,6 +249,7 @@ [FV.DXEFV] INF OvmfPkg/LsiScsiDxe/LsiScsiDxe.inf=0D !endif=0D =0D + INF SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf=0D !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE=0D INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootCon= figDxe.inf=0D !endif=0D diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc index f39d9cd117e6..5572cb82998f 100644 --- a/OvmfPkg/OvmfPkgX64.dsc +++ b/OvmfPkg/OvmfPkgX64.dsc @@ -1023,6 +1023,7 @@ [Components] }=0D !endif=0D =0D + SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf=0D !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE=0D SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDx= e.inf=0D OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf=0D diff --git a/OvmfPkg/OvmfPkgX64.fdf b/OvmfPkg/OvmfPkgX64.fdf index c0f5a1ef3c30..d42deebe3f8f 100644 --- a/OvmfPkg/OvmfPkgX64.fdf +++ b/OvmfPkg/OvmfPkgX64.fdf @@ -274,6 +274,7 @@ [FV.DXEFV] INF OvmfPkg/LsiScsiDxe/LsiScsiDxe.inf=0D !endif=0D =0D +INF SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.inf=0D !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE=0D INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootCon= figDxe.inf=0D !endif=0D --=20 2.35.1