-
Notifications
You must be signed in to change notification settings - Fork 7.3k
Thread-level Memory Protection Support #2937
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
by Marcus Shawcroft: We should give some consideration to using mpu support to fault null pointer accesses. There is a post on devel The recent post on devel https://lists.zephyrproject.org/pipermail/zephyr-devel/2017-March/007426.html that touches on some of the developer experience issues that arise from the the C standards treatment of null pointers and various related compiler optimizations. |
by Andrew Boie: The scope of this JIRA is way too broad and needs to be decomposed into deliverables. |
by Mark Linkmeyer: Andrew to break up in to stories. |
by Andrew Boie: Survey from Linaro of MPU capabilities across a variety of arches/CPUs https://wiki.linaro.org/Memory%20Protection%20Device%20Survey |
by Andrew Boie: Notes from Andy on high-level requirements:
|
by Andrew Boie: Marcus Shawcroft NULL pointer protection will be tracked in GH-3634, thanks! |
|
Reported by Anas Nashif:
Run trusted software in privileged mode and run all less-trusted software in unprivileged mode. Examples of trusted code are RTOSs, ISRs, handlers, and low-level drivers. Examples of less-trusted code are untested code third party software, and code that is vulnerable to malware such as protocol stacks and high-level drivers.
(Imported from Jira ZEP-1466)
The text was updated successfully, but these errors were encountered: