CONFIG_X86_NO_SPECULATIVE_VULNERABILITIES¶
(No prompt – not directly user assignable.)
Type: bool
Help¶
This hidden option should be set on a per-SOC basis to indicate that
a particular SOC does not perform any kind of speculative execution,
or is a newer chip which is immune to the class of vulnerabilities
which exploit speculative execution side channel attacks.
Defaults¶
No defaults. Implicitly defaults to n.
Symbols selected by this symbol¶
Kconfig definition¶
At <Zephyr Architecture>/x86/Kconfig:419
Included via Kconfig:8 → Kconfig.zephyr:39 → <Zephyr Architecture>/Kconfig:12
Menu path: (Top) → X86 Architecture Options
config X86_NO_SPECULATIVE_VULNERABILITIES
    bool
    select X86_NO_MELTDOWN
    select X86_NO_SPECTRE_V1
    select X86_NO_SPECTRE_V2
    select X86_NO_SPECTRE_V4
    select X86_NO_LAZY_FP
    depends on X86
    help
      This hidden option should be set on a per-SOC basis to indicate that
      a particular SOC does not perform any kind of speculative execution,
      or is a newer chip which is immune to the class of vulnerabilities
      which exploit speculative execution side channel attacks.
(The ‘depends on’ condition includes propagated dependencies from ifs and menus.)