From 7d7f4336c876360eea4213583305b8a304e7f69f Mon Sep 17 00:00:00 2001 From: Andrew Boie Date: Thu, 28 Feb 2019 15:50:46 -0800 Subject: [PATCH] x86: don't default to 'y' for spectre configs The SOC code can set whether it's known that the CPU is immune, don't default to turning this off. Signed-off-by: Andrew Boie --- arch/x86/Kconfig | 2 -- 1 file changed, 2 deletions(-) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index 507ffa3642f..2ee4e37ed1a 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -78,14 +78,12 @@ config X86_NO_MELTDOWN config X86_NO_SPECTRE_V2 bool - default y help This hidden option should be set on a per-SOC basis to indicate that a particular SOC is not vulnerable to the Spectre V2 CPU vulnerability. config X86_NO_SPECTRE_V4 bool - default y help This hidden option should be set on a per-SOC basis to indicate that a particular SOC is not vulnerable to the Spectre V4 CPU vulnerability.