summaryrefslogtreecommitdiff
path: root/sys-kernel/linux-image-redcore/files/fix-spectre_v2-mitigation-strings.patch
diff options
context:
space:
mode:
authorV3n3RiX <venerix@redcorelinux.org>2018-04-28 06:10:11 +0100
committerV3n3RiX <venerix@redcorelinux.org>2018-04-28 06:10:11 +0100
commitccd6f4e1705d634ffd2aa863c73f43f5bcc4876f (patch)
tree4e0b14fb3adaa01f84447bf04b081f90eedb1eaa /sys-kernel/linux-image-redcore/files/fix-spectre_v2-mitigation-strings.patch
parent714b5615d9e699d428b7aa021fb8237a327ac8a2 (diff)
sys-kernel/linux-{image,sources}-redcore : version bump
Diffstat (limited to 'sys-kernel/linux-image-redcore/files/fix-spectre_v2-mitigation-strings.patch')
-rw-r--r--sys-kernel/linux-image-redcore/files/fix-spectre_v2-mitigation-strings.patch28
1 files changed, 28 insertions, 0 deletions
diff --git a/sys-kernel/linux-image-redcore/files/fix-spectre_v2-mitigation-strings.patch b/sys-kernel/linux-image-redcore/files/fix-spectre_v2-mitigation-strings.patch
new file mode 100644
index 00000000..f77bb823
--- /dev/null
+++ b/sys-kernel/linux-image-redcore/files/fix-spectre_v2-mitigation-strings.patch
@@ -0,0 +1,28 @@
+diff -Naur linux-4.16.5/arch/x86/kernel/cpu/bugs.c linux-4.16.5-p/arch/x86/kernel/cpu/bugs.c
+--- linux-4.16.5/arch/x86/kernel/cpu/bugs.c 2018-04-26 11:00:39.000000000 +0200
++++ linux-4.16.5-p/arch/x86/kernel/cpu/bugs.c 2018-04-28 02:34:28.424306602 +0200
+@@ -292,13 +292,13 @@
+ if ((!boot_cpu_has(X86_FEATURE_PTI) &&
+ !boot_cpu_has(X86_FEATURE_SMEP)) || is_skylake_era()) {
+ setup_force_cpu_cap(X86_FEATURE_RSB_CTXSW);
+- pr_info("Spectre v2 mitigation: Filling RSB on context switch\n");
++ pr_info("Mitigation: Filling RSB on context switch\n");
+ }
+
+ /* Initialize Indirect Branch Prediction Barrier if supported */
+ if (boot_cpu_has(X86_FEATURE_IBPB)) {
+ setup_force_cpu_cap(X86_FEATURE_USE_IBPB);
+- pr_info("Spectre v2 mitigation: Enabling Indirect Branch Prediction Barrier\n");
++ pr_info("Mitigation: Enabling Indirect Branch Prediction Barrier\n");
+ }
+
+ /*
+@@ -307,7 +307,7 @@
+ */
+ if (boot_cpu_has(X86_FEATURE_IBRS)) {
+ setup_force_cpu_cap(X86_FEATURE_USE_IBRS_FW);
+- pr_info("Enabling Restricted Speculation for firmware calls\n");
++ pr_info("Mitigation: Enabling Restricted Speculation for firmware calls\n");
+ }
+ }
+