From 6681bf218f9556b094e34f5f854b20d42d7e2e84 Mon Sep 17 00:00:00 2001 From: "Justin M. Forbes" Date: Thu, 3 Sep 2020 11:45:01 -0500 Subject: Linux v5.7.6 rebase Signed-off-by: Justin M. Forbes --- configs/fedora/generic/CONFIG_ARM64_BTI | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 configs/fedora/generic/CONFIG_ARM64_BTI (limited to 'configs/fedora/generic/CONFIG_ARM64_BTI') diff --git a/configs/fedora/generic/CONFIG_ARM64_BTI b/configs/fedora/generic/CONFIG_ARM64_BTI new file mode 100644 index 000000000..5af4d535b --- /dev/null +++ b/configs/fedora/generic/CONFIG_ARM64_BTI @@ -0,0 +1,31 @@ +# CONFIG_ARM64_BTI: +# +# Branch Target Identification (part of the ARMv8.5 Extensions) +# provides a mechanism to limit the set of locations to which computed +# branch instructions such as BR or BLR can jump. +# +# To make use of BTI on CPUs that support it, say Y. +# +# BTI is intended to provide complementary protection to other control +# flow integrity protection mechanisms, such as the Pointer +# authentication mechanism provided as part of the ARMv8.3 Extensions. +# For this reason, it does not make sense to enable this option without +# also enabling support for pointer authentication. Thus, when +# enabling this option you should also select ARM64_PTR_AUTH=y. +# +# Userspace binaries must also be specifically compiled to make use of +# this mechanism. If you say N here or the hardware does not support +# BTI, such binaries can still run, but you get no additional +# enforcement of branch destinations. +# +# Symbol: ARM64_BTI [=y] +# Type : bool +# Defined at arch/arm64/Kconfig:1594 +# Prompt: Branch Target Identification support +# Location: +# -> Kernel Features +# -> ARMv8.5 architectural features +# +# +# +CONFIG_ARM64_BTI=y -- cgit