CONFIG_X86_NO_SPECULATIVE_VULNERABILITIES
(No prompt – not directly user assignable.)
Type: bool
Help
This hidden option should be set on a per-SOC basis to indicate that
a particular SOC does not perform any kind of speculative execution,
or is a newer chip which is immune to the class of vulnerabilities
which exploit speculative execution side channel attacks.
Direct dependencies
(Includes any dependencies from ifs and menus.)
Defaults
No defaults. Implicitly defaults to n
.
Symbols selected by this symbol
Kconfig definition
At <Zephyr>/arch/x86/Kconfig:419
Included via <Zephyr>/Kconfig:8
→ <Zephyr>/Kconfig.zephyr:39
→ <Zephyr>/arch/Kconfig:12
Menu path: (Top) → X86 Architecture Options
config X86_NO_SPECULATIVE_VULNERABILITIES
bool
select X86_NO_MELTDOWN
select X86_NO_SPECTRE_V1
select X86_NO_SPECTRE_V2
select X86_NO_SPECTRE_V4
select X86_NO_LAZY_FP
depends on X86
help
This hidden option should be set on a per-SOC basis to indicate that
a particular SOC does not perform any kind of speculative execution,
or is a newer chip which is immune to the class of vulnerabilities
which exploit speculative execution side channel attacks.
(The ‘depends on’ condition includes propagated dependencies from ifs and menus.)