x86: don't default to 'y' for spectre configs
The SOC code can set whether it's known that the CPU is immune, don't default to turning this off. Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
This commit is contained in:
parent
d3c89fea4f
commit
7d7f4336c8
1 changed files with 0 additions and 2 deletions
|
@ -78,14 +78,12 @@ config X86_NO_MELTDOWN
|
|||
|
||||
config X86_NO_SPECTRE_V2
|
||||
bool
|
||||
default y
|
||||
help
|
||||
This hidden option should be set on a per-SOC basis to indicate that
|
||||
a particular SOC is not vulnerable to the Spectre V2 CPU vulnerability.
|
||||
|
||||
config X86_NO_SPECTRE_V4
|
||||
bool
|
||||
default y
|
||||
help
|
||||
This hidden option should be set on a per-SOC basis to indicate that
|
||||
a particular SOC is not vulnerable to the Spectre V4 CPU vulnerability.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue