diff options
author | Venkatesh Yadav Abbarapu | 2023-08-24 08:57:12 +0530 |
---|---|---|
committer | Michal Simek | 2023-09-21 13:20:10 +0200 |
commit | 4a5c8e897623ebdb0c2d52ef7f488a3921258974 (patch) | |
tree | ff0070ce4eb6610f906e60a56b13a0c9a98b30bf /configs/xilinx_zynqmp_virt_defconfig | |
parent | 2cf78f951bc9bc2b549f311327e61b86bd86d175 (diff) |
arm64: zynqmp: Enable the config CMD_KASLRSEED
Kernel Address Space Layout Randomization (KASLR) is a hardening
feature that aims to make it more difficult to take advantage
of known exploits in the kernel, by placing kernel data structures
at a random address at each boot.The bootloader supports randomizing
the virtual address at which the kernel image is loaded.
The bootloader must provide entropy by passing a random u64 value
in the /chosen/kaslr-seed device tree node.
When we run "kaslrseed" command from U-Boot, the bootloader will
genarate the kaslr-seed and update the /chosen/kaslr-seed DT property.
Signed-off-by: Venkatesh Yadav Abbarapu <venkatesh.abbarapu@amd.com>
Link: https://lore.kernel.org/r/20230824032712.13399-1-venkatesh.abbarapu@amd.com
Signed-off-by: Michal Simek <michal.simek@amd.com>
Diffstat (limited to 'configs/xilinx_zynqmp_virt_defconfig')
-rw-r--r-- | configs/xilinx_zynqmp_virt_defconfig | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/configs/xilinx_zynqmp_virt_defconfig b/configs/xilinx_zynqmp_virt_defconfig index 26260841c59..26820f721e3 100644 --- a/configs/xilinx_zynqmp_virt_defconfig +++ b/configs/xilinx_zynqmp_virt_defconfig @@ -90,6 +90,7 @@ CONFIG_CMD_RTC=y CONFIG_CMD_TIME=y CONFIG_CMD_GETTIME=y CONFIG_CMD_RNG=y +CONFIG_CMD_KASLRSEED=y CONFIG_CMD_TIMER=y CONFIG_CMD_REGULATOR=y CONFIG_CMD_SMC=y |