summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorBorislav Petkov <bp@suse.de>2018-01-02 14:19:49 +0100
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2018-01-05 15:44:26 +0100
commit750fb627d764eb66430c36961b94ab0002694c02 (patch)
tree098fb334a54b4f31cbfabba20010e5582497d265 /security
parent3e809caffdd7beeac731feb16788873c3bdb811e (diff)
x86/kaiser: Reenable PARAVIRT
Now that the required bits have been addressed, reenable PARAVIRT. Signed-off-by: Borislav Petkov <bp@suse.de> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'security')
-rw-r--r--security/Kconfig2
1 files changed, 1 insertions, 1 deletions
diff --git a/security/Kconfig b/security/Kconfig
index 8d5d2407be7e..89f2d35367b2 100644
--- a/security/Kconfig
+++ b/security/Kconfig
@@ -34,7 +34,7 @@ config SECURITY
config KAISER
bool "Remove the kernel mapping in user mode"
default y
- depends on X86_64 && SMP && !PARAVIRT
+ depends on X86_64 && SMP
help
This enforces a strict kernel and user space isolation, in order
to close hardware side channels on kernel address information.