mirror of
https://github.com/zephyrproject-rtos/zephyr
synced 2025-09-02 17:33:00 +00:00
Speculative execution side channel attacks can read the entire FPU/SIMD register state on affected Intel Core processors, see CVE-2018-3665. We now have two options for managing floating point context between threads on x86: CONFIG_EAGER_FP_SHARING and CONFIG_LAZY_FP_SHARING. The mitigation is to unconditionally save/restore these registers on context switch, instead of the lazy sharing algorithm used by CONFIG_LAZY_FP_SHARING. Signed-off-by: Andrew Boie <andrew.p.boie@intel.com> |
||
---|---|---|
.. | ||
offsets | ||
cache_s.S | ||
cache.c | ||
CMakeLists.txt | ||
cpuhalt.c | ||
crt0.S | ||
excstub.S | ||
fatal.c | ||
float.c | ||
intstub.S | ||
irq_manage.c | ||
irq_offload.c | ||
Kconfig | ||
reboot_rst_cnt.c | ||
spec_ctrl.c | ||
swap.S | ||
sys_fatal_error_handler.c | ||
thread.c | ||
userspace.S | ||
x86_mmu.c |