aboutsummaryrefslogtreecommitdiffstats
path: root/target/linux/generic/pending-5.15/920-mangle_bootargs.patch
diff options
context:
space:
mode:
authorRui Salvaterra <rsalvaterra@gmail.com>2022-06-10 09:07:31 +0100
committerHauke Mehrtens <hauke@hauke-m.de>2022-06-27 00:57:16 +0200
commitaee1215c0e1a7382ef7ab986564d00defcfaf52e (patch)
treec071c3d22229d592a4b145fc7a59218301dfa178 /target/linux/generic/pending-5.15/920-mangle_bootargs.patch
parent53d99fedc7afd96adfb6f38fc939c9ee9981c2ed (diff)
downloadupstream-aee1215c0e1a7382ef7ab986564d00defcfaf52e.tar.gz
upstream-aee1215c0e1a7382ef7ab986564d00defcfaf52e.tar.bz2
upstream-aee1215c0e1a7382ef7ab986564d00defcfaf52e.zip
kernel: 5.15: x86-64: enable CONFIG_SLS
Starting with GCC 12, we have the possibility of mitigating straight-line speculation vulnerabilities in x86-64 targets. Make it so. Reported-by: Stefan Lippers-Hollmann <s.l-h@gmx.de> Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
Diffstat (limited to 'target/linux/generic/pending-5.15/920-mangle_bootargs.patch')
0 files changed, 0 insertions, 0 deletions