[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[xen staging-4.16] x86/cet: Remove XEN_SHSTK's dependency on EXPERT



commit c7a861b2d065e7c26f9d499df32eb99f546e1671
Author:     Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
AuthorDate: Mon Feb 28 19:31:00 2022 +0000
Commit:     Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
CommitDate: Fri Mar 25 17:06:38 2022 +0000

    x86/cet: Remove XEN_SHSTK's dependency on EXPERT
    
    CET-SS hardware is now available from multiple vendors, the feature has
    downstream users, and was declared security supported in XSA-398.
    
    Enable it by default.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
    Reviewed-by: Juergen Gross <jgross@xxxxxxxx>
    (cherry picked from commit fc90d75c2b71ae15b75128e7d0d4dbe718164ecb)
---
 xen/arch/x86/Kconfig | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/xen/arch/x86/Kconfig b/xen/arch/x86/Kconfig
index be343218de..ef72e7821b 100644
--- a/xen/arch/x86/Kconfig
+++ b/xen/arch/x86/Kconfig
@@ -116,8 +116,8 @@ config HVM
          If unsure, say Y.
 
 config XEN_SHSTK
-       bool "Supervisor Shadow Stacks (EXPERT)"
-       depends on HAS_AS_CET_SS && EXPERT
+       bool "Supervisor Shadow Stacks"
+       depends on HAS_AS_CET_SS
        default y
        ---help---
          Control-flow Enforcement Technology (CET) is a set of features in
--
generated by git-patchbot for /home/xen/git/xen.git#staging-4.16



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.