This is the documentation for the latest (main) development branch of Zephyr. If you are looking for the documentation of previous releases, use the drop-down menu on the left and select the desired version.

CONFIG_X86_NO_SPECULATIVE_VULNERABILITIES

(No prompt – not directly user assignable.)

Type: bool

Help

This hidden option should be set on a per-SOC basis to indicate that
a particular SOC does not perform any kind of speculative execution,
or is a newer chip which is immune to the class of vulnerabilities
which exploit speculative execution side channel attacks.

Direct dependencies

X86

(Includes any dependencies from ifs and menus.)

Defaults

No defaults. Implicitly defaults to n.

Kconfig definition

At arch/x86/Kconfig:419

Included via Kconfig:8Kconfig.zephyr:39arch/Kconfig:12

Menu path: (Top) → X86 Architecture Options

config X86_NO_SPECULATIVE_VULNERABILITIES
    bool
    select X86_NO_MELTDOWN
    select X86_NO_SPECTRE_V1
    select X86_NO_SPECTRE_V2
    select X86_NO_SPECTRE_V4
    select X86_NO_LAZY_FP
    depends on X86
    help
      This hidden option should be set on a per-SOC basis to indicate that
      a particular SOC does not perform any kind of speculative execution,
      or is a newer chip which is immune to the class of vulnerabilities
      which exploit speculative execution side channel attacks.

(The ‘depends on’ condition includes propagated dependencies from ifs and menus.)