• Mark Brown's avatar
    efi/arm64: Update debug prints to reflect other entropy sources · 1c761ee9
    Mark Brown authored
    Currently the EFI stub prints a diagnostic on boot saying that KASLR will
    be disabled if it is unable to use the EFI RNG protocol to obtain a seed
    for KASLR.  With the addition of support for v8.5-RNG and the SMCCC RNG
    protocol it is now possible for KASLR to obtain entropy even if the EFI
    RNG protocol is unsupported in the system, and the main kernel now
    explicitly says if KASLR is active itself.  This can result in a boot
    log where the stub says KASLR has been disabled and the main kernel says
    that it is enabled which is confusing for users.
    
    Remove the explicit reference to KASLR from the diagnostics, the warnings
    are still useful as EFI is the only source of entropy the stub uses when
    randomizing the physical address of the kernel and the other sources may
    not be available.
    Signed-off-by: default avatarMark Brown <broonie@kernel.org>
    Link: https://lore.kernel.org/r/20210120163810.14973-1-broonie@kernel.orgSigned-off-by: default avatarArd Biesheuvel <ardb@kernel.org>
    1c761ee9
arm64-stub.c 3.21 KB