[OS-BUILD PATCH 0/0] [redhat] New configs in arch/arm64

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



From: CKI Gitlab on gitlab.com
Merge Request: https://gitlab.com/cki-project/kernel-ark/-/merge_requests/1190
NOTE: Truncated patchset due to missing public @redhat.com email
      address on your GitLab profile at https://gitlab.com/-/profile.
      Once that is fixed, close and reopen the merge request to
      retrigger sending the emails.

Hi,

As part of the ongoing rebase effort, the following configuration
options need to be reviewed.

As a reminder, the ARK configuration flow involves moving unreviewed
configuration options from the pending directory to the ark directory.
In the diff below, options are removed from the pending directory and
added to the ark hierarchy. The final options that need to be ACKed
are the files that are being added to the ark hierarchy.

If the value for a file that is added should be changed, please reply
with a better option.

 CONFIG_ARM64_PTR_AUTH_KERNEL:

 If the compiler supports the -mbranch-protection or
 -msign-return-address flag (e.g. GCC 7 or later), then this option
 will cause the kernel itself to be compiled with return address
 protection. In this case, and if the target hardware is known to
 support pointer authentication, then CONFIG_STACKPROTECTOR can be
 disabled with minimal loss of protection.

 This feature works with FUNCTION_GRAPH_TRACER option only if
 DYNAMIC_FTRACE_WITH_REGS is enabled.

 Symbol: ARM64_PTR_AUTH_KERNEL [=y]
 Type  : bool
 Defined at arch/arm64/Kconfig:1506
   Prompt: Use pointer authentication for kernel
   Depends on: ARM64_PTR_AUTH [=y] && (CC_HAS_SIGN_RETURN_ADDRESS [=y] ||
CC_HAS_BRANCH_PROT_PAC_RET [=y]) && AS_HAS_PAC [=y] && (LD_IS_LLD [=n] ||
LD_VERSION [=25000]>=23301 || CC_IS_GCC [=y] && GCC_VERSION [=200000]<90100)
&& (!CC_IS_CLANG [=n] || AS_HAS_CFI_NEGATE_RA_STATE [=y]) &&
(!FUNCTION_GRAPH_TRACER [=y] || DYNAMIC_FTRACE_WITH_REGS [=y])
   Location:
     -> Kernel Features
       -> ARMv8.3 architectural features
         -> Enable support for pointer authentication (ARM64_PTR_AUTH [=y])

---

Cc: Mark Salter <msalter@xxxxxxxxxx>
Cc: Mark Langsdorf <mlangsdo@xxxxxxxxxx>
Cc: Jeremy Linton <jlinton@xxxxxxxxxx>
Signed-off-by: Fedora Kernel Team <kernel-team@xxxxxxxxxxxxxxxxx>

---
 redhat/configs/common/generic/arm/aarch64/CONFIG_ARM64_PTR_AUTH_KERNEL |   1 +
 redhat/configs/pending-common/generic/CONFIG_ARM64_PTR_AUTH_KERNEL     |  25 ----------
 2 files changed, 1 insertions(+), 25 deletions(-)
_______________________________________________
kernel mailing list -- kernel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to kernel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/kernel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure




[Index of Archives]     [Fedora General Discussion]     [Older Fedora Users Archive]     [Fedora Advisory Board]     [Fedora Security]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Mentors]     [Fedora Package Announce]     [Fedora Package Review]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Coolkey]     [Yum Users]     [Tux]     [Yosemite News]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [USB]     [Asterisk PBX]

  Powered by Linux