openwrt/target/linux/x86
Rui Salvaterra aee1215c0e kernel: 5.15: x86-64: enable CONFIG_SLS
Starting with GCC 12, we have the possibility of mitigating straight-line
speculation vulnerabilities in x86-64 targets. Make it so.

Reported-by: Stefan Lippers-Hollmann <s.l-h@gmx.de>
Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2022-06-27 00:57:16 +02:00
..
64 kernel: 5.15: x86-64: enable CONFIG_SLS 2022-06-27 00:57:16 +02:00
base-files
generic generic: enable CRYPTO_LIB_BLAKE2S[_X86|_ARM] 2022-06-24 17:10:24 +02:00
geode x86: fix damaged config 5.10 refresh 2022-06-24 23:59:14 +02:00
image
legacy generic: enable CRYPTO_LIB_BLAKE2S[_X86|_ARM] 2022-06-24 17:10:24 +02:00
patches-5.10 kernel: x86: remove an upstreamed patch 2022-04-20 11:53:07 +01:00
patches-5.15 kernel: x86: remove an upstreamed patch 2022-04-20 11:53:07 +01:00
config-5.10 x86: fix damaged config 5.10 refresh 2022-06-24 23:59:14 +02:00
config-5.15 x86: fix damaged config 5.10 refresh 2022-06-24 23:59:14 +02:00
Makefile
modules.mk kernel/x86: move x86' specific watchdogs to the x86 target 2022-05-07 14:31:22 +02:00