From aee1215c0e1a7382ef7ab986564d00defcfaf52e Mon Sep 17 00:00:00 2001
From: Rui Salvaterra <rsalvaterra@gmail.com>
Date: Fri, 10 Jun 2022 09:07:31 +0100
Subject: [PATCH] kernel: 5.15: x86-64: enable CONFIG_SLS

Starting with GCC 12, we have the possibility of mitigating straight-line
speculation vulnerabilities in x86-64 targets. Make it so.

Reported-by: Stefan Lippers-Hollmann <s.l-h@gmx.de>
Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
---
 target/linux/x86/64/config-5.15 | 1 +
 1 file changed, 1 insertion(+)

diff --git a/target/linux/x86/64/config-5.15 b/target/linux/x86/64/config-5.15
index def112b91b7..5bba17d0b6f 100644
--- a/target/linux/x86/64/config-5.15
+++ b/target/linux/x86/64/config-5.15
@@ -402,6 +402,7 @@ CONFIG_SENSORS_K8TEMP=y
 CONFIG_SENSORS_VIA_CPUTEMP=y
 CONFIG_SERIAL_8250_PNP=y
 CONFIG_SERIAL_MCTRL_GPIO=y
+CONFIG_SLS=y
 CONFIG_SMP=y
 CONFIG_SOCK_RX_QUEUE_MAPPING=y
 CONFIG_SPARSEMEM=y