zephyr/arch
Andrew Boie a96631dce9 x86: organize vulnerability ontology
We introduce hidden Kconfigs for all speculative
side channel attacks that we plan to address in the
kernel and update the existing ones to indicate their
CVEs.

This list keeps growing, so introduce a new config
CONFIG_X86_NO_SPECULATIVE_VULNERABILITIES, for CPUs
which don't speculatively execute, or are otherwise
immune by design.

Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
2019-03-11 09:54:04 -07:00
..
arc kconfig: arch: arm/arc: Remove duplicated CPU_HAS_MPU dependencies 2019-03-09 09:55:41 -05:00
arm arch: arm: documentation fixes for _new_thread() 2019-03-09 11:57:24 -08:00
common
nios2 linker: remove references to _k_task_list/_k_event_list 2019-03-09 16:01:23 -05:00
posix kconfig: arch: posix: Remove redundant ARCH_POSIX dep. 2019-03-09 10:02:41 -05:00
riscv32
x86 x86: organize vulnerability ontology 2019-03-11 09:54:04 -07:00
x86_64
xtensa
CMakeLists.txt
Kconfig