summaryrefslogtreecommitdiffstats
path: root/configs/fedora/generic/CONFIG_ARM64_BTI
diff options
context:
space:
mode:
authorJustin M. Forbes <jforbes@fedoraproject.org>2021-03-17 12:44:57 -0500
committerJustin M. Forbes <jforbes@fedoraproject.org>2021-03-17 12:44:57 -0500
commitc7a5157d4de03982fcd2e3cd1f035858153ab349 (patch)
tree668203ddf31d69847944bd024141f0df51734f08 /configs/fedora/generic/CONFIG_ARM64_BTI
parentf1ef1f7f32c9a1eaf82dff51b2cc209b712a6b01 (diff)
downloadkernel-c7a5157d4de03982fcd2e3cd1f035858153ab349.tar.gz
kernel-c7a5157d4de03982fcd2e3cd1f035858153ab349.tar.xz
kernel-c7a5157d4de03982fcd2e3cd1f035858153ab349.zip
kernel-5.11.7-9
* Wed Mar 17 2021 Justin M. Forbes <jforbes@fedoraproject.org> [5.11.7-9] - Disable weak-modules again rhbz 1828455 (Justin M. Forbes) - More config updates for gcc-plugin turn off (Justin M. Forbes) - fedora: the PCH_CAN driver is x86-32 only (Peter Robinson) - common: disable legacy CAN device support (Peter Robinson) - common: Enable Microchip MCP251x/MCP251xFD CAN controllers (Peter Robinson) - common: Bosch MCAN support for Intel Elkhart Lake (Peter Robinson) - common: enable CAN_PEAK_PCIEFD PCI-E driver (Peter Robinson) - common: disable CAN_PEAK_PCIEC PCAN-ExpressCard (Peter Robinson) - common: enable common CAN layer 2 protocols (Peter Robinson) - ark: disable CAN_LEDS option (Peter Robinson) Resolves: rhbz# Signed-off-by: Justin M. Forbes <jforbes@fedoraproject.org>
Diffstat (limited to 'configs/fedora/generic/CONFIG_ARM64_BTI')
-rw-r--r--configs/fedora/generic/CONFIG_ARM64_BTI31
1 files changed, 0 insertions, 31 deletions
diff --git a/configs/fedora/generic/CONFIG_ARM64_BTI b/configs/fedora/generic/CONFIG_ARM64_BTI
deleted file mode 100644
index 5af4d535b..000000000
--- a/configs/fedora/generic/CONFIG_ARM64_BTI
+++ /dev/null
@@ -1,31 +0,0 @@
-# CONFIG_ARM64_BTI:
-#
-# Branch Target Identification (part of the ARMv8.5 Extensions)
-# provides a mechanism to limit the set of locations to which computed
-# branch instructions such as BR or BLR can jump.
-#
-# To make use of BTI on CPUs that support it, say Y.
-#
-# BTI is intended to provide complementary protection to other control
-# flow integrity protection mechanisms, such as the Pointer
-# authentication mechanism provided as part of the ARMv8.3 Extensions.
-# For this reason, it does not make sense to enable this option without
-# also enabling support for pointer authentication. Thus, when
-# enabling this option you should also select ARM64_PTR_AUTH=y.
-#
-# Userspace binaries must also be specifically compiled to make use of
-# this mechanism. If you say N here or the hardware does not support
-# BTI, such binaries can still run, but you get no additional
-# enforcement of branch destinations.
-#
-# Symbol: ARM64_BTI [=y]
-# Type : bool
-# Defined at arch/arm64/Kconfig:1594
-# Prompt: Branch Target Identification support
-# Location:
-# -> Kernel Features
-# -> ARMv8.5 architectural features
-#
-#
-#
-CONFIG_ARM64_BTI=y