Quote from https://capsule8.com/blog/kernel-configuration-glossary/: > Significance: Critical > > In support of Kernel Address Space Layout Randomization (KASLR) this randomizes > the physical address at which the kernel image is decompressed and the virtual > address where the kernel image is mapped as a security feature that deters > exploit attempts relying on knowledge of the location of kernel code internals. IMHO this is safe to be enabled on any architecture.
Patch for aarch64: https://patchwork.ipfire.org/patch/3162/
@Arne: Since I am not sure on whether enabling this on armv5tel, I would like to assign this bug to you.
Patch for armv5tel: https://patchwork.ipfire.org/patch/3172/
build fails on aarch64! https://nightly.ipfire.org/next/2020-06-09%2022:20:26%20+0000-e694bbd1/aarch64/
https://git.ipfire.org/?p=ipfire-2.x.git;a=commit;h=7caecf45fbaab7f681d0aa3d5ea87ca660ff4f3d
Short test on an RPi3 works now.
https://blog.ipfire.org/post/ipfire-2-27-core-update-170-is-available-for-testing
https://blog.ipfire.org/post/ipfire-2-27-core-update-170-released