:orphan: .. title:: X86_NO_SPECULATIVE_VULNERABILITIES .. option:: CONFIG_X86_NO_SPECULATIVE_VULNERABILITIES *(No prompt -- not directly user assignable.)* Type: ``bool`` Help ==== This hidden option should be set on a per-SOC basis to indicate that a particular SOC does not perform any kind of speculative execution, or is a newer chip which is immune to the class of vulnerabilities which exploit speculative execution side channel attacks. Direct dependencies =================== \ :option:`X86 ` *(Includes any dependencies from ifs and menus.)* Defaults ======== No defaults. Implicitly defaults to ``n``. Symbols selected by this symbol =============================== - \ :option:`X86_NO_MELTDOWN ` - \ :option:`X86_NO_SPECTRE_V1 ` - \ :option:`X86_NO_SPECTRE_V2 ` - \ :option:`X86_NO_SPECTRE_V4 ` - \ :option:`X86_NO_LAZY_FP ` Kconfig definition ================== .. highlight:: kconfig At ``arch/x86/Kconfig:256`` Included via ``Kconfig:8`` → ``Kconfig.zephyr:29`` → ``arch/Kconfig:12`` Menu path: (Top) → X86 Architecture Options .. parsed-literal:: config X86_NO_SPECULATIVE_VULNERABILITIES bool select \ :option:`X86_NO_MELTDOWN ` select \ :option:`X86_NO_SPECTRE_V1 ` select \ :option:`X86_NO_SPECTRE_V2 ` select \ :option:`X86_NO_SPECTRE_V4 ` select \ :option:`X86_NO_LAZY_FP ` depends on \ :option:`X86 ` help This hidden option should be set on a per-SOC basis to indicate that a particular SOC does not perform any kind of speculative execution, or is a newer chip which is immune to the class of vulnerabilities which exploit speculative execution side channel attacks. *(The 'depends on' condition includes propagated dependencies from ifs and menus.)*