Message ID | 20190321230557.45107-11-jeremy.linton@arm.com |
---|---|
State | Superseded |
Headers | show |
Series | arm64: add system vulnerability sysfs entries | expand |
Hi Jeremy, > Jeremy Linton <jeremy.linton@arm.com> hat am 22. März 2019 um 00:05 geschrieben: > > > From: Mian Yousaf Kaukab <ykaukab@suse.de> > > Enable CPU vulnerabilty show functions for spectre_v1, spectre_v2, > meltdown and store-bypass. > > Signed-off-by: Mian Yousaf Kaukab <ykaukab@suse.de> > Signed-off-by: Jeremy Linton <jeremy.linton@arm.com> > Reviewed-by: Andre Przywara <andre.przywara@arm.com> > Tested-by: Stefan Wahren <stefan.wahren@i2se.com> FWIW i tested the series on top of today's linux-next with RPi 3B+ and it's still fine. Stefan
diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig index 7e34b9eba5de..6a7b7d4e0e90 100644 --- a/arch/arm64/Kconfig +++ b/arch/arm64/Kconfig @@ -90,6 +90,7 @@ config ARM64 select GENERIC_CLOCKEVENTS select GENERIC_CLOCKEVENTS_BROADCAST select GENERIC_CPU_AUTOPROBE + select GENERIC_CPU_VULNERABILITIES select GENERIC_EARLY_IOREMAP select GENERIC_IDLE_POLL_SETUP select GENERIC_IRQ_MULTI_HANDLER