Home
last modified time | relevance | path

Searched refs:retpoline (Results 1 – 8 of 8) sorted by relevance

/Linux-v5.10/tools/objtool/
Dbuiltin-check.c21 bool no_fp, no_unreachable, retpoline, module, backtrace, uaccess, stats, validate_dup, vmlinux; variable
31 OPT_BOOLEAN('r', "retpoline", &retpoline, "Validate retpoline assumptions"),
Dbuiltin.h11 extern bool no_fp, no_unreachable, retpoline, module, backtrace, uaccess, stats, validate_dup, vmli…
Dcheck.c2894 if (retpoline) { in check()
/Linux-v5.10/Documentation/admin-guide/hw-vuln/
Dspectre.rst204 "retpoline") :ref:`[3] <spec_ref3>` :ref:`[9] <spec_ref9>` for all
209 mitigate Spectre variant 2 instead of retpoline. Enhanced IBRS is
210 more efficient than retpoline.
345 retpoline mitigation or if the CPU has hardware mitigation, and if the
370 'Mitigation: Full generic retpoline' Software-focused mitigation
371 'Mitigation: Full AMD retpoline' AMD-specific software mitigation
448 To turn on retpoline mitigation on a vulnerable CPU, the kernel
460 IBRS on x86), retpoline is automatically disabled at run time.
462 The retpoline mitigation is turned on by default on vulnerable
515 Linux kernel uses retpoline or Enhanced IBRS to prevent consumption of
[all …]
/Linux-v5.10/arch/x86/lib/
DMakefile51 lib-$(CONFIG_RETPOLINE) += retpoline.o
/Linux-v5.10/scripts/
DMakefile.build228 objtool_args += --retpoline
/Linux-v5.10/Documentation/admin-guide/
Dkernel-parameters.txt4947 retpoline - replace indirect branches
4948 retpoline,generic - google's original retpoline
4949 retpoline,amd - AMD-specific minimal thunk
/Linux-v5.10/arch/x86/
DKconfig459 Compile kernel with the retpoline compiler options to guard against