mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-19 02:34:01 +08:00
f7f510ec19
Note that by itself, having a "hardware" random generator does very little: you should probably run "rngd" in your guest to feed this into the kernel entropy pool. Included: virtio_rng: dont use vmalloced addresses for virtio If virtio_rng is build as a module, random_data is an address in vmalloc space. As virtio expects guest real addresses, this can cause any kind of funny behaviour, so lets allocate random_data dynamically with kmalloc. Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com> Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
9 lines
176 B
C
9 lines
176 B
C
#ifndef _LINUX_VIRTIO_RNG_H
|
|
#define _LINUX_VIRTIO_RNG_H
|
|
#include <linux/virtio_config.h>
|
|
|
|
/* The ID for virtio_rng */
|
|
#define VIRTIO_ID_RNG 4
|
|
|
|
#endif /* _LINUX_VIRTIO_RNG_H */
|