CONFIG_X86_NO_SPECULATIVE_VULNERABILITIES

(No prompt – not directly user assignable.)

Type: bool

Help

This hidden option should be set on a per-SOC basis to indicate that a particular SOC does not perform any kind of speculative execution, or is a newer chip which is immune to the class of vulnerabilities which exploit speculative execution side channel attacks.

Direct dependencies

X86

(Includes any dependencies from ifs and menus.)

Defaults

No defaults. Implicitly defaults to n.

Kconfig definition

At <Zephyr>/arch/x86/Kconfig:263

Included via <Zephyr>/Kconfig:8<Zephyr>/Kconfig.zephyr:29<Zephyr>/arch/Kconfig:12

Menu path: (Top) → X86 Architecture Options

config X86_NO_SPECULATIVE_VULNERABILITIES
    bool
    select X86_NO_MELTDOWN
    select X86_NO_SPECTRE_V1
    select X86_NO_SPECTRE_V2
    select X86_NO_SPECTRE_V4
    select X86_NO_LAZY_FP
    depends on X86
    help
      This hidden option should be set on a per-SOC basis to indicate that
      a particular SOC does not perform any kind of speculative execution,
      or is a newer chip which is immune to the class of vulnerabilities
      which exploit speculative execution side channel attacks.

(The ‘depends on’ condition includes propagated dependencies from ifs and menus.)