lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 22 Mar 2019 18:49:01 +0100 (CET) From: Stefan Wahren <stefan.wahren@...e.com> To: Jeremy Linton <jeremy.linton@....com>, linux-arm-kernel@...ts.infradead.org Cc: mlangsdo@...hat.com, suzuki.poulose@....com, marc.zyngier@....com, catalin.marinas@....com, julien.thierry@....com, will.deacon@....com, linux-kernel@...r.kernel.org, Andre Przywara <andre.przywara@....com>, Mian Yousaf Kaukab <ykaukab@...e.de>, Dave.Martin@....com, shankerd@...eaurora.org Subject: Re: [PATCH v6 10/10] arm64: enable generic CPU vulnerabilites support Hi Jeremy, > Jeremy Linton <jeremy.linton@....com> hat am 22. März 2019 um 00:05 geschrieben: > > > From: Mian Yousaf Kaukab <ykaukab@...e.de> > > Enable CPU vulnerabilty show functions for spectre_v1, spectre_v2, > meltdown and store-bypass. > > Signed-off-by: Mian Yousaf Kaukab <ykaukab@...e.de> > Signed-off-by: Jeremy Linton <jeremy.linton@....com> > Reviewed-by: Andre Przywara <andre.przywara@....com> > Tested-by: Stefan Wahren <stefan.wahren@...e.com> FWIW i tested the series on top of today's linux-next with RPi 3B+ and it's still fine. Stefan
Powered by blists - more mailing lists