Message ID | 20181031140436.2964-6-dave.long@linaro.org |
---|---|
State | Superseded |
Headers | show
Delivered-To: patches@linaro.org Received: by 2002:a2e:299d:0:0:0:0:0 with SMTP id p29-v6csp6836032ljp; Wed, 31 Oct 2018 07:04:47 -0700 (PDT) X-Received: by 2002:a67:ebc3:: with SMTP id y3mr524456vso.75.1540994687282; Wed, 31 Oct 2018 07:04:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540994687; cv=none; d=google.com; s=arc-20160816; b=zLWjmq4fjPw0l3KkGl+afduuKjs/w9s5PlH7QO5gHIoqmdgQGr9Zr6+IBG3p5OAnkK aSzSMAfmPFoA3nucouj57pDA54FL+38A947+6yPADVx0z4cHiNktS5tzCawQguEphz70 rd1ZtdCu9+CJ6Xj3kEh/+VOCauY+5sETOF0+jXdLoqCsysATPM4KORijw6Q6qqwGewCj OiiG2HhKRiPZn9h+OGHWpEzzkwFb2LkKR0SsIsb1O3dLtH1O79uqdskiDKk6CaTy4e6Q zl4ocA332MbOZ3HgPXmKD33mt/QD8Hip6WQjrw6S92jDS8uq3sPJVwY4nlxgg0Y/9PVM y+ng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=iY0C5tZptmS259+EdQcS5tjulW6ZksJIMP4AJC8oZq4=; b=th1/Q08QRSGsjR9OOW5UmHPU0RPxou4D7XqWMjRZwan58zOaCVrbUG4H/knogSQts3 maRKM6r+XjP9PwoBb6Lx0Ait5PXwjBhk79e8fo3oa7FvXijhjhsryDhBEggG6cFQ7Tcz 2VT6xB1mVbWzCAtSCja3ul7D822OvOetxYfjWekfRzMJppNVGkToCrVEUm8weYAP6rNF 9X4AGwRlfqR1PocPwDCuC1hIc0EINTaVpZSUWMzC2YLfRfmA/rz1gIgz2bPk5VhI5Hze 8X395zsP1zr95P9dv380Kx9SPmIFQIZt70WS/G1C+93zEHmw3NRiLRS0A9GBcEisflJO u3cg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="Yuk1W/Tm"; spf=pass (google.com: domain of dave.long@linaro.org designates 209.85.220.65 as permitted sender) smtp.mailfrom=dave.long@linaro.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: <dave.long@linaro.org> Received: from mail-sor-f65.google.com (mail-sor-f65.google.com. [209.85.220.65]) by mx.google.com with SMTPS id p100sor4363583uap.6.2018.10.31.07.04.47 for <patches@linaro.org> (Google Transport Security); Wed, 31 Oct 2018 07:04:47 -0700 (PDT) Received-SPF: pass (google.com: domain of dave.long@linaro.org designates 209.85.220.65 as permitted sender) client-ip=209.85.220.65; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="Yuk1W/Tm"; spf=pass (google.com: domain of dave.long@linaro.org designates 209.85.220.65 as permitted sender) smtp.mailfrom=dave.long@linaro.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=iY0C5tZptmS259+EdQcS5tjulW6ZksJIMP4AJC8oZq4=; b=Yuk1W/Tm5cGYw9I9u4+xHd6Z1YjrfhZu8L0zK4d0X8r9vgf5B//V9drnIudoj0/HFT 4//ivx4/sUN9b4EbXaTyaH1d+S1TPvkPbZVBc3wR8OwmCo0qhRfsbQP6t8VGo9M/6m+s FzB101y5GF1d8id6xqwMF4V0KLwyEXVwa/U8w= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=iY0C5tZptmS259+EdQcS5tjulW6ZksJIMP4AJC8oZq4=; b=O32MufPzRvTUKWvJ9034UEzRPisqdgbUKdBDZiEsbAXFQuK+e0Gp2onQuBvZO68+lB 4hR8Oktmv1h5sSP0AyxYegE6Nlj/FbbEeZsv7znmoAhJrxw2xSokt1LbcWx9co35HKoh cQSmSs4gm5r2yYKntySYnzoErkOpPY1B057dyHgqF1MVcw600oJ4nS3pvnO8fmqkG7bt P64S683Q81TEByEVOv0jRIj0IImz863MCGZVXadjENA3h+PIj6O2QznUzIkytpeNO4t8 f1iPzMXnP9Y4NjCRNnONE44VymWu9Um48Ak03CP7Aps+f3u713l2qPbUlCLpr8/VS5ao j6Ug== X-Gm-Message-State: AGRZ1gKkJVTQ0atMrtNkobLjnLmGXsvgBoxewYQbprULWd2jqaUAmS0C RM2zy0FhJjj8hVWjWE8eBJSTKpJH X-Google-Smtp-Source: AJdET5caf0ijU/68utFvGbs2ArxHaaEp8QGrT3tJ4rV/5sHLWYHlUYRxSjolQGrnmU6/9JgGI4HLow== X-Received: by 2002:a9f:2b06:: with SMTP id p6mr1445950uaj.103.1540994686587; Wed, 31 Oct 2018 07:04:46 -0700 (PDT) Return-Path: <dave.long@linaro.org> Received: from dave-Dell-System-XPS-L502X.hsd1.nh.comcast.net ([2603:3005:3403:7100:2c71:8680:34e1:a6aa]) by smtp.googlemail.com with ESMTPSA id 6sm6795632vsy.25.2018.10.31.07.04.44 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 31 Oct 2018 07:04:46 -0700 (PDT) From: David Long <dave.long@linaro.org> To: stable@vger.kernel.org, Russell King - ARM Linux <linux@armlinux.org.uk>, Florian Fainelli <f.fainelli@gmail.com>, Tony Lindgren <tony@atomide.com>, Marc Zyngier <marc.zyngier@arm.com>, Mark Rutland <mark.rutland@arm.com> Cc: Greg KH <gregkh@linuxfoundation.org>, Mark Brown <broonie@kernel.org> Subject: [PATCH 4.4 05/18] ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre Date: Wed, 31 Oct 2018 10:04:23 -0400 Message-Id: <20181031140436.2964-6-dave.long@linaro.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20181031140436.2964-1-dave.long@linaro.org> References: <20181031140436.2964-1-dave.long@linaro.org> |
Series |
V4.4 backport of 32-bit arm spectre patches
|
expand
|
diff --git a/arch/arm/mm/Kconfig b/arch/arm/mm/Kconfig index 41218867a9a6..7ef92e6692ab 100644 --- a/arch/arm/mm/Kconfig +++ b/arch/arm/mm/Kconfig @@ -396,6 +396,7 @@ config CPU_V7 select CPU_CP15_MPU if !MMU select CPU_HAS_ASID if MMU select CPU_PABRT_V7 + select CPU_SPECTRE if MMU select CPU_TLB_V7 if MMU # ARMv7M @@ -793,6 +794,9 @@ config CPU_BPREDICT_DISABLE help Say Y here to disable branch prediction. If unsure, say N. +config CPU_SPECTRE + bool + config TLS_REG_EMUL bool select NEED_KUSER_HELPERS