diff options
author | Rui Salvaterra <rsalvaterra@gmail.com> | 2022-06-10 09:07:31 +0100 |
---|---|---|
committer | Hauke Mehrtens <hauke@hauke-m.de> | 2022-06-27 00:57:16 +0200 |
commit | aee1215c0e1a7382ef7ab986564d00defcfaf52e (patch) | |
tree | c071c3d22229d592a4b145fc7a59218301dfa178 /target/linux/x86/64/config-5.15 | |
parent | 53d99fedc7afd96adfb6f38fc939c9ee9981c2ed (diff) | |
download | upstream-aee1215c0e1a7382ef7ab986564d00defcfaf52e.tar.gz upstream-aee1215c0e1a7382ef7ab986564d00defcfaf52e.tar.bz2 upstream-aee1215c0e1a7382ef7ab986564d00defcfaf52e.zip |
kernel: 5.15: x86-64: enable CONFIG_SLS
Starting with GCC 12, we have the possibility of mitigating straight-line
speculation vulnerabilities in x86-64 targets. Make it so.
Reported-by: Stefan Lippers-Hollmann <s.l-h@gmx.de>
Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
Diffstat (limited to 'target/linux/x86/64/config-5.15')
-rw-r--r-- | target/linux/x86/64/config-5.15 | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/target/linux/x86/64/config-5.15 b/target/linux/x86/64/config-5.15 index def112b91b..5bba17d0b6 100644 --- a/target/linux/x86/64/config-5.15 +++ b/target/linux/x86/64/config-5.15 @@ -402,6 +402,7 @@ CONFIG_SENSORS_K8TEMP=y CONFIG_SENSORS_VIA_CPUTEMP=y CONFIG_SERIAL_8250_PNP=y CONFIG_SERIAL_MCTRL_GPIO=y +CONFIG_SLS=y CONFIG_SMP=y CONFIG_SOCK_RX_QUEUE_MAPPING=y CONFIG_SPARSEMEM=y |