:orphan: .. title:: X86_BOUNDS_CHECK_BYPASS_MITIGATION .. option:: CONFIG_X86_BOUNDS_CHECK_BYPASS_MITIGATION *(No prompt -- not directly user assignable.)* Type: ``bool`` Help ==== Hidden config to select arch-independent option to enable Spectre V1 mitigations by default if the CPU is not known to be immune to it. Direct dependencies =================== \ :option:`USERSPACE ` && \ :option:`X86 ` *(Includes any dependencies from ifs and menus.)* Default ======= - y if !\ :option:`X86_NO_SPECTRE_V1 ` Symbols selected by this symbol =============================== - \ :option:`BOUNDS_CHECK_BYPASS_MITIGATION ` Kconfig definition ================== .. highlight:: kconfig At ``arch/x86/Kconfig:298`` Included via ``Kconfig:8`` → ``Kconfig.zephyr:29`` → ``arch/Kconfig:12`` Menu path: (Top) → X86 Architecture Options .. parsed-literal:: config X86_BOUNDS_CHECK_BYPASS_MITIGATION bool default y if !\ :option:`X86_NO_SPECTRE_V1 ` select \ :option:`BOUNDS_CHECK_BYPASS_MITIGATION ` depends on \ :option:`USERSPACE ` && \ :option:`X86 ` help Hidden config to select arch-independent option to enable Spectre V1 mitigations by default if the CPU is not known to be immune to it. *(The 'depends on' condition includes propagated dependencies from ifs and menus.)*