zephyr/arch/x86
Leandro Pereira ecadd465a2 arch: x86: Allow disabling speculative store bypass
In order to mitigate against Spectre V4, add an option that will, at
boot time, verify if the CPU supports the SPEC_CTRL MSR; if so, it'll
attempt to disable the feature.

More information can be found in chapter 4 (Speculative Store Bypass
Mitigation) of the "Speculative Execution Side Channel Mitigations"
document, version 2, published by Intel: https://goo.gl/nocTcj

Signed-off-by: Leandro Pereira <leandro.pereira@intel.com>
2018-05-24 13:07:12 -04:00
..
core arch: x86: Allow disabling speculative store bypass 2018-05-24 13:07:12 -04:00
include arch: x86: Allow disabling speculative store bypass 2018-05-24 13:07:12 -04:00
soc kconfig: Drop support for CONFIG_TOOLCHAIN_VARIANT 2018-05-22 11:15:36 -04:00
CMakeLists.txt gdb_server: Remove leftover testing and x86 parts 2018-05-24 08:10:21 -04:00
Kconfig arch: x86: Allow disabling speculative store bypass 2018-05-24 13:07:12 -04:00
defconfig