-
CONFIG_X86_NO_SPECULATIVE_VULNERABILITIES
¶
(No prompt – not directly user assignable.)
Type: bool
Help¶
This hidden option should be set on a per-SOC basis to indicate that a particular SOC does not perform any kind of speculative execution, or is a newer chip which is immune to the class of vulnerabilities which exploit speculative execution side channel attacks.
Defaults¶
No defaults. Implicitly defaults to n
.
Symbols selected by this symbol¶
Kconfig definition¶
At <Zephyr>/arch/x86/Kconfig:264
Included via <Zephyr>/Kconfig:8
→ <Zephyr>/Kconfig.zephyr:29
→ <Zephyr>/arch/Kconfig:12
Menu path: (Top) → X86 Architecture Options
config X86_NO_SPECULATIVE_VULNERABILITIES bool selectX86_NO_MELTDOWN
selectX86_NO_SPECTRE_V1
selectX86_NO_SPECTRE_V2
selectX86_NO_SPECTRE_V4
selectX86_NO_LAZY_FP
depends onX86
help This hidden option should be set on a per-SOC basis to indicate that a particular SOC does not perform any kind of speculative execution, or is a newer chip which is immune to the class of vulnerabilities which exploit speculative execution side channel attacks.
(The ‘depends on’ condition includes propagated dependencies from ifs and menus.)