zephyr/arch
Andrew Boie 82205e61e7 x86: fix Spectre V1 index checks
We add two points where we add lfences to disable
speculation:

* In the memory buffer validation code, which takes memory
  addresses and sizes from userspace and determins whether
  this memory is actually accessible.

* In the system call landing site, after the system call ID
  has been validated but before it is used.

Kconfigs have been added to enable these checks if the CPU
is not known to be immune on X86.

Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
2019-03-11 09:54:04 -07:00
..
arc kconfig: arch: arm/arc: Remove duplicated CPU_HAS_MPU dependencies 2019-03-09 09:55:41 -05:00
arm arch: arm: documentation fixes for _new_thread() 2019-03-09 11:57:24 -08:00
common gen_isr_tables: Fix _sw_isr_table generation for multi-level IRQs 2019-02-06 10:13:25 -05:00
nios2 linker: remove references to _k_task_list/_k_event_list 2019-03-09 16:01:23 -05:00
posix kconfig: arch: posix: Remove redundant ARCH_POSIX dep. 2019-03-09 10:02:41 -05:00
riscv32 arch: riscv32: Fix trivial comment 2019-01-31 07:40:24 -05:00
x86 x86: fix Spectre V1 index checks 2019-03-11 09:54:04 -07:00
x86_64 arch/x86_64: Non-kconfig symbols shouldn't look like kconfig 2019-03-08 06:53:39 -05:00
xtensa boards: intel_s1000_crb: fix setting cache attributes 2019-02-15 16:21:50 -05:00
CMakeLists.txt Build: Added support for out-of-tree Arch 2019-02-07 17:00:43 -05:00
Kconfig arch: minor white-space fix in Kconfig 2019-02-28 11:57:25 -08:00