Searched refs:retpoline (Results 1 – 8 of 8) sorted by relevance
/Linux-v5.10/tools/objtool/ |
D | builtin-check.c | 21 bool no_fp, no_unreachable, retpoline, module, backtrace, uaccess, stats, validate_dup, vmlinux; variable 31 OPT_BOOLEAN('r', "retpoline", &retpoline, "Validate retpoline assumptions"),
|
D | builtin.h | 11 extern bool no_fp, no_unreachable, retpoline, module, backtrace, uaccess, stats, validate_dup, vmli…
|
D | check.c | 2894 if (retpoline) { in check()
|
/Linux-v5.10/Documentation/admin-guide/hw-vuln/ |
D | spectre.rst | 204 "retpoline") :ref:`[3] <spec_ref3>` :ref:`[9] <spec_ref9>` for all 209 mitigate Spectre variant 2 instead of retpoline. Enhanced IBRS is 210 more efficient than retpoline. 345 retpoline mitigation or if the CPU has hardware mitigation, and if the 370 'Mitigation: Full generic retpoline' Software-focused mitigation 371 'Mitigation: Full AMD retpoline' AMD-specific software mitigation 448 To turn on retpoline mitigation on a vulnerable CPU, the kernel 460 IBRS on x86), retpoline is automatically disabled at run time. 462 The retpoline mitigation is turned on by default on vulnerable 515 Linux kernel uses retpoline or Enhanced IBRS to prevent consumption of [all …]
|
/Linux-v5.10/arch/x86/lib/ |
D | Makefile | 51 lib-$(CONFIG_RETPOLINE) += retpoline.o
|
/Linux-v5.10/scripts/ |
D | Makefile.build | 228 objtool_args += --retpoline
|
/Linux-v5.10/Documentation/admin-guide/ |
D | kernel-parameters.txt | 4947 retpoline - replace indirect branches 4948 retpoline,generic - google's original retpoline 4949 retpoline,amd - AMD-specific minimal thunk
|
/Linux-v5.10/arch/x86/ |
D | Kconfig | 459 Compile kernel with the retpoline compiler options to guard against
|