:orphan: .. title:: CONFIG_X86_NO_SPECTRE_V1 .. kconfig:: CONFIG_X86_NO_SPECTRE_V1 CONFIG_X86_NO_SPECTRE_V1 ######################## *(No prompt -- not directly user assignable.)* Type: ``bool`` Help ==== .. code-block:: none This hidden option should be set on a per-SOC basis to indicate that a particular SOC is not vulnerable to the Spectre V1, V1.1, V1.2, and swapgs CPU vulnerabilities as described in CVE-2017-5753, CVE-2018-3693, and CVE-2019-1125. Direct dependencies =================== \ :kconfig:`X86 ` *(Includes any dependencies from ifs and menus.)* Defaults ======== No defaults. Implicitly defaults to ``n``. Symbols that select this symbol =============================== - \ :kconfig:`X86_NO_SPECULATIVE_VULNERABILITIES ` Kconfig definition ================== At ``/x86/Kconfig:390`` Included via ``Kconfig:8`` → ``Kconfig.zephyr:39`` → ``/Kconfig:12`` Menu path: (Top) → X86 Architecture Options .. code-block:: kconfig config X86_NO_SPECTRE_V1 bool depends on X86 help This hidden option should be set on a per-SOC basis to indicate that a particular SOC is not vulnerable to the Spectre V1, V1.1, V1.2, and swapgs CPU vulnerabilities as described in CVE-2017-5753, CVE-2018-3693, and CVE-2019-1125. *(The 'depends on' condition includes propagated dependencies from ifs and menus.)*