diff mbox series

kernel 5.15: x86-64: enable CONFIG_SLS

Message ID 20220610082003.2548-1-rsalvaterra@gmail.com
State Superseded
Delegated to: Rui Salvaterra
Headers show
Series kernel 5.15: x86-64: enable CONFIG_SLS | expand

Commit Message

Rui Salvaterra June 10, 2022, 8:20 a.m. UTC
Starting with GCC 12, we have the possibility of mitigating straight-line
speculation vulnerabilities in x86-64 targets. Make it so.

Reported-by: Stefan Lippers-Hollmann <s.l-h@gmx.de>
Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
---
 target/linux/x86/64/config-5.15 | 1 +
 1 file changed, 1 insertion(+)

Comments

Rui Salvaterra June 22, 2022, 7:59 a.m. UTC | #1
Hi, everyone,

On Fri, 10 Jun 2022 at 09:20, Rui Salvaterra <rsalvaterra@gmail.com> wrote:
>
> Starting with GCC 12, we have the possibility of mitigating straight-line
> speculation vulnerabilities in x86-64 targets. Make it so.

[patch snipped]

I've made this part of the 5.15 pull request [1], so I'll mark it as
superseded on Patchwork.

Cheers,
Rui

[1] https://github.com/openwrt/openwrt/pull/10019/commits
diff mbox series

Patch

diff --git a/target/linux/x86/64/config-5.15 b/target/linux/x86/64/config-5.15
index d168f3608e..5b50708ba1 100644
--- a/target/linux/x86/64/config-5.15
+++ b/target/linux/x86/64/config-5.15
@@ -400,6 +400,7 @@  CONFIG_SENSORS_K8TEMP=y
 CONFIG_SENSORS_VIA_CPUTEMP=y
 CONFIG_SERIAL_8250_PNP=y
 CONFIG_SERIAL_MCTRL_GPIO=y
+CONFIG_SLS=y
 CONFIG_SMP=y
 CONFIG_SOCK_RX_QUEUE_MAPPING=y
 CONFIG_SPARSEMEM=y