-
CONFIG_X86_NO_SPECULATIVE_VULNERABILITIES
¶
(No prompt – not directly user assignable.)
Type: bool
Help¶
This hidden option should be set on a per-SOC basis to indicate that
a particular SOC does not perform any kind of speculative execution,
or is a newer chip which is immune to the class of vulnerabilities
which exploit speculative execution side channel attacks.
Defaults¶
No defaults. Implicitly defaults to n
.
Symbols selected by this symbol¶
Kconfig definition¶
At <Zephyr>/arch/x86/Kconfig:420
Included via <Zephyr>/Kconfig:8
→ <Zephyr>/Kconfig.zephyr:29
→ <Zephyr>/arch/Kconfig:12
Menu path: (Top) → X86 Architecture Options
config X86_NO_SPECULATIVE_VULNERABILITIES
bool
select X86_NO_MELTDOWN
select X86_NO_SPECTRE_V1
select X86_NO_SPECTRE_V2
select X86_NO_SPECTRE_V4
select X86_NO_LAZY_FP
depends on X86
help
This hidden option should be set on a per-SOC basis to indicate that
a particular SOC does not perform any kind of speculative execution,
or is a newer chip which is immune to the class of vulnerabilities
which exploit speculative execution side channel attacks.
(The ‘depends on’ condition includes propagated dependencies from ifs and menus.)