]> xenbits.xensource.com Git - xen.git/commitdiff
x86/cet: Remove XEN_SHSTK's dependency on EXPERT
authorAndrew Cooper <andrew.cooper3@citrix.com>
Mon, 28 Feb 2022 19:31:00 +0000 (19:31 +0000)
committerAndrew Cooper <andrew.cooper3@citrix.com>
Fri, 25 Mar 2022 17:06:38 +0000 (17:06 +0000)
CET-SS hardware is now available from multiple vendors, the feature has
downstream users, and was declared security supported in XSA-398.

Enable it by default.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Juergen Gross <jgross@suse.com>
(cherry picked from commit fc90d75c2b71ae15b75128e7d0d4dbe718164ecb)

xen/arch/x86/Kconfig

index be343218de19d592beff974a858b23f54d1c2e9c..ef72e7821b25d7caf7a26e6f3bd897e53962c51d 100644 (file)
@@ -116,8 +116,8 @@ config HVM
          If unsure, say Y.
 
 config XEN_SHSTK
-       bool "Supervisor Shadow Stacks (EXPERT)"
-       depends on HAS_AS_CET_SS && EXPERT
+       bool "Supervisor Shadow Stacks"
+       depends on HAS_AS_CET_SS
        default y
        ---help---
          Control-flow Enforcement Technology (CET) is a set of features in