From: Rui Salvaterra Date: Fri, 10 Jun 2022 08:07:31 +0000 (+0100) Subject: kernel: 5.15: x86-64: enable CONFIG_SLS X-Git-Url: http://git.openwrt.org/?a=commitdiff_plain;h=aee1215c0e1a7382ef7ab986564d00defcfaf52e;p=openwrt%2Fstaging%2Fstintel.git kernel: 5.15: x86-64: enable CONFIG_SLS Starting with GCC 12, we have the possibility of mitigating straight-line speculation vulnerabilities in x86-64 targets. Make it so. Reported-by: Stefan Lippers-Hollmann Signed-off-by: Rui Salvaterra --- diff --git a/target/linux/x86/64/config-5.15 b/target/linux/x86/64/config-5.15 index def112b91b..5bba17d0b6 100644 --- a/target/linux/x86/64/config-5.15 +++ b/target/linux/x86/64/config-5.15 @@ -402,6 +402,7 @@ CONFIG_SENSORS_K8TEMP=y CONFIG_SENSORS_VIA_CPUTEMP=y CONFIG_SERIAL_8250_PNP=y CONFIG_SERIAL_MCTRL_GPIO=y +CONFIG_SLS=y CONFIG_SMP=y CONFIG_SOCK_RX_QUEUE_MAPPING=y CONFIG_SPARSEMEM=y