Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp742598imu; Fri, 25 Jan 2019 10:08:25 -0800 (PST) X-Google-Smtp-Source: ALg8bN4AHH5BGxyANrEuZ3ufUcglSxug/JEoOOEhW3g0H6k/FGW0lyNYVT9ELRip6OPECj4uJnFD X-Received: by 2002:a62:30c3:: with SMTP id w186mr11961022pfw.39.1548439705894; Fri, 25 Jan 2019 10:08:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548439705; cv=none; d=google.com; s=arc-20160816; b=PxUEwuzIqz6l+m6PUxw+OGd9SJT3uMZX56XNkTiQRmwrq862Yo/IgIkrCBlbYhymZO kTg0XZ3xdVKRgxIW9f9UDPRYmRD7QrGQTJz2eKAwPWVbSnvcGtMAd9K6N2AsMGXbtQPt 18ISDxV33XtI0BZiYOFjTECX2oFiuVBx1ZGQoukaui46LH90Lb9cDrbcqHaj/2BLb68/ BkuoM7KuaRCCbmxiL/ivAnD4GugYNKieYEl/9gUCGVkw35iHUDDtp1zriiyXPMZbrjYu SGuZh33vdzZCh7biEwf6HjpsbqoGoND3n4tYe/5iAhASG1YPzj31Oz+w4o9OQHetjuY7 PmwA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=bx+/lbxEEvp1c6AmFlHAZaFDiMN4xpnArIUet7fiZCg=; b=ldNulhS8WengYm9TA0l7FQqrChwr51PP7G9tCF+nlBdyzQq6ET6DSGLvYjWnDqAJSn ZHZQmgwxEgo6t1rzKkJ3yqPMBRQdV0162C0UbkM5OktUvyUJ2wK4l5zzbq20i3r2i1Ne qHfhDDcjSqhJCGJaLLsXaqWeiHXzoiqHWyD3KCgCmziN0i36ZdWjEY2tJrVI7SbFj+r1 iIO6KZ0zg4/vWUb9vllK10hB/ScDVD49hqfMgnAK1r4U2FxWZeNR5yFiz9pqtc4BHk7c o8jKavZzZIAudDuxmJ6u9JNhIc0bEXQ+pUucVTz+VIoLtAWXq+jCKhXXt8fffBLFdvm3 xTGg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 37si7182805plv.243.2019.01.25.10.08.10; Fri, 25 Jan 2019 10:08:25 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729451AbfAYSHq (ORCPT + 99 others); Fri, 25 Jan 2019 13:07:46 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:51898 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729400AbfAYSHe (ORCPT ); Fri, 25 Jan 2019 13:07:34 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 7A41B1596; Fri, 25 Jan 2019 10:07:34 -0800 (PST) Received: from beelzebub.austin.arm.com (beelzebub.austin.arm.com [10.118.12.119]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id C43C73F5AF; Fri, 25 Jan 2019 10:07:33 -0800 (PST) From: Jeremy Linton To: linux-arm-kernel@lists.infradead.org Cc: catalin.marinas@arm.com, will.deacon@arm.com, marc.zyngier@arm.com, suzuki.poulose@arm.com, dave.martin@arm.com, shankerd@codeaurora.org, linux-kernel@vger.kernel.org, ykaukab@suse.de, julien.thierry@arm.com, mlangsdo@redhat.com, steven.price@arm.com, stefan.wahren@i2se.com, Jeremy Linton Subject: [PATCH v4 12/12] arm64: enable generic CPU vulnerabilites support Date: Fri, 25 Jan 2019 12:07:11 -0600 Message-Id: <20190125180711.1970973-13-jeremy.linton@arm.com> X-Mailer: git-send-email 2.17.2 In-Reply-To: <20190125180711.1970973-1-jeremy.linton@arm.com> References: <20190125180711.1970973-1-jeremy.linton@arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mian Yousaf Kaukab Enable CPU vulnerabilty show functions for spectre_v1, spectre_v2, meltdown and store-bypass. Signed-off-by: Mian Yousaf Kaukab Signed-off-by: Jeremy Linton --- arch/arm64/Kconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig index 09a85410d814..36a7cfbbfbb3 100644 --- a/arch/arm64/Kconfig +++ b/arch/arm64/Kconfig @@ -88,6 +88,7 @@ config ARM64 select GENERIC_CLOCKEVENTS select GENERIC_CLOCKEVENTS_BROADCAST select GENERIC_CPU_AUTOPROBE + select GENERIC_CPU_VULNERABILITIES select GENERIC_EARLY_IOREMAP select GENERIC_IDLE_POLL_SETUP select GENERIC_IRQ_MULTI_HANDLER -- 2.17.2