x86: don't default to 'y' for spectre configs
The SOC code can set whether it's known that the CPU is immune, don't default to turning this off. Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
This commit is contained in:
parent
d3c89fea4f
commit
7d7f4336c8
1 changed files with 0 additions and 2 deletions
|
@ -78,14 +78,12 @@ config X86_NO_MELTDOWN
|
||||||
|
|
||||||
config X86_NO_SPECTRE_V2
|
config X86_NO_SPECTRE_V2
|
||||||
bool
|
bool
|
||||||
default y
|
|
||||||
help
|
help
|
||||||
This hidden option should be set on a per-SOC basis to indicate that
|
This hidden option should be set on a per-SOC basis to indicate that
|
||||||
a particular SOC is not vulnerable to the Spectre V2 CPU vulnerability.
|
a particular SOC is not vulnerable to the Spectre V2 CPU vulnerability.
|
||||||
|
|
||||||
config X86_NO_SPECTRE_V4
|
config X86_NO_SPECTRE_V4
|
||||||
bool
|
bool
|
||||||
default y
|
|
||||||
help
|
help
|
||||||
This hidden option should be set on a per-SOC basis to indicate that
|
This hidden option should be set on a per-SOC basis to indicate that
|
||||||
a particular SOC is not vulnerable to the Spectre V4 CPU vulnerability.
|
a particular SOC is not vulnerable to the Spectre V4 CPU vulnerability.
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue