arch: x86: Rename CPU_NO_SPECTRE to CPU_NO_SPECTRE_V2
There's a new known variant, so make it clear what this one is for. Signed-off-by: Leandro Pereira <leandro.pereira@intel.com>
This commit is contained in:
parent
46a3e8bdf0
commit
fb0fba91a5
2 changed files with 2 additions and 2 deletions
|
@ -90,7 +90,7 @@ config X86_NO_MELTDOWN
|
||||||
This hidden option should be set on a per-SOC basis to indicate that
|
This hidden option should be set on a per-SOC basis to indicate that
|
||||||
a particular SOC is not vulnerable to the Meltdown CPU vulnerability.
|
a particular SOC is not vulnerable to the Meltdown CPU vulnerability.
|
||||||
|
|
||||||
config X86_NO_SPECTRE
|
config X86_NO_SPECTRE_V2
|
||||||
bool
|
bool
|
||||||
default y
|
default y
|
||||||
help
|
help
|
||||||
|
|
|
@ -556,7 +556,7 @@ menu "Security Options"
|
||||||
config RETPOLINE
|
config RETPOLINE
|
||||||
bool
|
bool
|
||||||
prompt "Build with retpolines enabled"
|
prompt "Build with retpolines enabled"
|
||||||
default y if !X86_NO_SPECTRE
|
default y if !X86_NO_SPECTRE_V2
|
||||||
help
|
help
|
||||||
This is recommended on platforms with speculative executions, to protect
|
This is recommended on platforms with speculative executions, to protect
|
||||||
against branch target injection (AKA Spectre-V2). Full description of
|
against branch target injection (AKA Spectre-V2). Full description of
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue