:orphan: .. title:: CONFIG_X86_NO_SPECULATIVE_VULNERABILITIES .. kconfig:: CONFIG_X86_NO_SPECULATIVE_VULNERABILITIES CONFIG_X86_NO_SPECULATIVE_VULNERABILITIES ######################################### *(No prompt -- not directly user assignable.)* Type: ``bool`` Help ==== .. code-block:: none This hidden option should be set on a per-SOC basis to indicate that a particular SOC does not perform any kind of speculative execution, or is a newer chip which is immune to the class of vulnerabilities which exploit speculative execution side channel attacks. Direct dependencies =================== \ :kconfig:`X86 ` *(Includes any dependencies from ifs and menus.)* Defaults ======== No defaults. Implicitly defaults to ``n``. Symbols selected by this symbol =============================== - \ :kconfig:`X86_NO_MELTDOWN ` - \ :kconfig:`X86_NO_SPECTRE_V1 ` - \ :kconfig:`X86_NO_SPECTRE_V2 ` - \ :kconfig:`X86_NO_SPECTRE_V4 ` - \ :kconfig:`X86_NO_LAZY_FP ` Kconfig definition ================== At ``/x86/Kconfig:419`` Included via ``Kconfig:8`` → ``Kconfig.zephyr:39`` → ``/Kconfig:12`` Menu path: (Top) → X86 Architecture Options .. code-block:: kconfig config X86_NO_SPECULATIVE_VULNERABILITIES bool select X86_NO_MELTDOWN select X86_NO_SPECTRE_V1 select X86_NO_SPECTRE_V2 select X86_NO_SPECTRE_V4 select X86_NO_LAZY_FP depends on X86 help This hidden option should be set on a per-SOC basis to indicate that a particular SOC does not perform any kind of speculative execution, or is a newer chip which is immune to the class of vulnerabilities which exploit speculative execution side channel attacks. *(The 'depends on' condition includes propagated dependencies from ifs and menus.)*