:orphan: .. title:: CONFIG_EAGER_FPU_SHARING .. kconfig:: CONFIG_EAGER_FPU_SHARING CONFIG_EAGER_FPU_SHARING ######################## *(No prompt -- not directly user assignable.)* Type: ``bool`` Help ==== .. code-block:: none This hidden option unconditionally saves/restores the FPU/SIMD register state on every context switch. Mitigates CVE-2018-3665, but incurs a performance hit. For vulnerable systems that process sensitive information in the FPU register set, should be used any time CONFIG_FPU is enabled, regardless if the FPU is used by one thread or multiple. Direct dependencies =================== \ :kconfig:`FPU ` && \ :kconfig:`USERSPACE ` && \ :kconfig:`CPU_HAS_FPU ` && !\ :kconfig:`X86_64 ` && \ :kconfig:`X86 ` *(Includes any dependencies from ifs and menus.)* Default ======= - y if !\ :kconfig:`X86_NO_LAZY_FP ` Kconfig definition ================== At ``/x86/core/Kconfig.ia32:106`` Included via ``Kconfig:8`` → ``Kconfig.zephyr:39`` → ``/Kconfig:12`` → ``/x86/Kconfig:482`` Menu path: (Top) → X86 Architecture Options → Processor Capabilities → Architecture Floating Point Options .. code-block:: kconfig config EAGER_FPU_SHARING bool default y if !X86_NO_LAZY_FP depends on FPU && USERSPACE && CPU_HAS_FPU && !X86_64 && X86 help This hidden option unconditionally saves/restores the FPU/SIMD register state on every context switch. Mitigates CVE-2018-3665, but incurs a performance hit. For vulnerable systems that process sensitive information in the FPU register set, should be used any time CONFIG_FPU is enabled, regardless if the FPU is used by one thread or multiple. *(The 'depends on' condition includes propagated dependencies from ifs and menus.)*