Lines Matching refs:speculative
7 and speculative execution on modern CPUs to read memory, possibly
18 use branch prediction and speculative execution.
53 CPUs use speculative operations to improve performance. That may leave
56 influence the speculative execution paths, and then use the side effects
57 of the speculative execution in the CPUs' caches and buffers to infer
58 privileged data touched during the speculative execution.
60 Spectre variant 1 attacks take advantage of speculative execution of
61 conditional branches, while Spectre variant 2 attacks use speculative
70 of speculative execution that bypasses conditional branch instructions
74 done speculatively before validation checks resolve. Such speculative
92 The branch target injection attack takes advantage of speculative
97 the victim. The side effects left in the CPU's caches during speculative
102 In Spectre variant 2 attacks, the attacker can steer speculative indirect
119 return stack buffer (RSB) :ref:`[13] <spec_ref13>` to cause speculative
131 speculative execution's side effects left in level 1 cache to infer the
151 for speculative execution. This could cause privileged memory to be
156 macros are used to prevent speculative loading of data.
178 swapgs, and then do a speculative percpu load using the user GS
186 rest of the speculative window.
194 target buffer on indirect jump and jump to gadget code in speculative
198 speculative execution, he would also need to pass a parameter to the
205 indirect branches. Return trampolines trap speculative execution paths
206 to prevent jumping to gadget code during speculative execution.
270 are used to stop speculative memory access.
274 the kernel to jump to gadget code in the speculative execution paths.
445 in an infinite loop to prevent any speculative execution jumping to
711 [1] `Intel analysis of speculative execution side channels <https://newsroom.intel.com/wp-content/u…
739 … side-channels <https://developer.arm.com/support/arm-security-updates/speculative-processor-vulne…
743 … issues update <https://developer.arm.com/support/arm-security-updates/speculative-processor-vulne…
755 …] `MIPS: response on speculative execution and side channel vulnerabilities <https://www.mips.com/…