]> xenbits.xensource.com Git - people/tklengyel/xen.git/commitdiff
x86/cet: Remove XEN_SHSTK's dependency on EXPERT
authorAndrew Cooper <andrew.cooper3@citrix.com>
Mon, 28 Feb 2022 19:31:00 +0000 (19:31 +0000)
committerAndrew Cooper <andrew.cooper3@citrix.com>
Fri, 25 Mar 2022 16:35:56 +0000 (16:35 +0000)
CET-SS hardware is now available from multiple vendors, the feature has
downstream users, and was declared security supported in XSA-398.

Enable it by default.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Juergen Gross <jgross@suse.com>
xen/arch/x86/Kconfig

index 83d0f317ecf93d5154278328591b00fe37835c27..06d6fbc864784020de8298a27b2cdda2b3af8464 100644 (file)
@@ -117,8 +117,8 @@ config HVM
          If unsure, say Y.
 
 config XEN_SHSTK
-       bool "Supervisor Shadow Stacks (EXPERT)"
-       depends on HAS_AS_CET_SS && EXPERT
+       bool "Supervisor Shadow Stacks"
+       depends on HAS_AS_CET_SS
        default y
        ---help---
          Control-flow Enforcement Technology (CET) is a set of features in