CONFIG_X86_NO_SPECULATIVE_VULNERABILITIES
(No prompt – not directly user assignable.)
Type: bool
Help
This hidden option should be set on a per-SOC basis to indicate that
a particular SOC does not perform any kind of speculative execution,
or is a newer chip which is immune to the class of vulnerabilities
which exploit speculative execution side channel attacks.
Defaults
No defaults. Implicitly defaults to n
.
Symbols selected by this symbol
Kconfig definition
At <Zephyr>/arch/x86/Kconfig:419
Included via <Zephyr>/Kconfig:8
→ <Zephyr>/Kconfig.zephyr:39
→ <Zephyr>/arch/Kconfig:12
Menu path: (Top) → X86 Architecture Options
config X86_NO_SPECULATIVE_VULNERABILITIES
bool
select X86_NO_MELTDOWN
select X86_NO_SPECTRE_V1
select X86_NO_SPECTRE_V2
select X86_NO_SPECTRE_V4
select X86_NO_LAZY_FP
depends on X86
help
This hidden option should be set on a per-SOC basis to indicate that
a particular SOC does not perform any kind of speculative execution,
or is a newer chip which is immune to the class of vulnerabilities
which exploit speculative execution side channel attacks.
(The ‘depends on’ condition includes propagated dependencies from ifs and menus.)