diff options
author | Stephen Boyd <swboyd@chromium.org> | 2020-10-20 23:45:44 +0200 |
---|---|---|
committer | Will Deacon <will@kernel.org> | 2020-10-21 12:07:27 +0200 |
commit | 66dd3474702aa98d5844367e1577cdad78ef7c65 (patch) | |
tree | febf32fd87b565b9699f567a340c4a47fe1fce82 /arch/openrisc/Kconfig | |
parent | arm64: spectre-v2: Favour CPU-specific mitigation at EL2 (diff) | |
download | linux-66dd3474702aa98d5844367e1577cdad78ef7c65.tar.xz linux-66dd3474702aa98d5844367e1577cdad78ef7c65.zip |
arm64: proton-pack: Update comment to reflect new function name
The function detect_harden_bp_fw() is gone after commit d4647f0a2ad7
("arm64: Rewrite Spectre-v2 mitigation code"). Update this comment to
reflect the new state of affairs.
Fixes: d4647f0a2ad7 ("arm64: Rewrite Spectre-v2 mitigation code")
Signed-off-by: Stephen Boyd <swboyd@chromium.org>
Cc: Marc Zyngier <maz@kernel.org>
Link: https://lore.kernel.org/r/20201020214544.3206838-3-swboyd@chromium.org
Signed-off-by: Will Deacon <will@kernel.org>
Diffstat (limited to 'arch/openrisc/Kconfig')
0 files changed, 0 insertions, 0 deletions