Searched refs:retpoline (Results 1 – 8 of 8) sorted by relevance
| /Linux-v5.15/tools/objtool/ |
| D | builtin-check.c | 22 bool no_fp, no_unreachable, retpoline, module, backtrace, uaccess, stats, variable 38 OPT_BOOLEAN('r', "retpoline", &retpoline, "Validate retpoline assumptions"),
|
| D | check.c | 3159 if (retpoline) { in check()
|
| /Linux-v5.15/tools/objtool/include/objtool/ |
| D | builtin.h | 11 extern bool no_fp, no_unreachable, retpoline, module, backtrace, uaccess, stats,
|
| /Linux-v5.15/Documentation/admin-guide/hw-vuln/ |
| D | spectre.rst | 204 "retpoline") :ref:`[3] <spec_ref3>` :ref:`[9] <spec_ref9>` for all 209 mitigate Spectre variant 2 instead of retpoline. Enhanced IBRS is 210 more efficient than retpoline. 345 retpoline mitigation or if the CPU has hardware mitigation, and if the 370 'Mitigation: Full generic retpoline' Software-focused mitigation 371 'Mitigation: Full AMD retpoline' AMD-specific software mitigation 448 To turn on retpoline mitigation on a vulnerable CPU, the kernel 460 IBRS on x86), retpoline is automatically disabled at run time. 462 The retpoline mitigation is turned on by default on vulnerable 515 Linux kernel uses retpoline or Enhanced IBRS to prevent consumption of [all …]
|
| /Linux-v5.15/arch/x86/lib/ |
| D | Makefile | 52 lib-$(CONFIG_RETPOLINE) += retpoline.o
|
| /Linux-v5.15/scripts/ |
| D | Makefile.lib | 242 $(if $(CONFIG_RETPOLINE), --retpoline) \
|
| /Linux-v5.15/Documentation/admin-guide/ |
| D | kernel-parameters.txt | 5263 retpoline - replace indirect branches 5264 retpoline,generic - google's original retpoline 5265 retpoline,amd - AMD-specific minimal thunk
|
| /Linux-v5.15/arch/x86/ |
| D | Kconfig | 466 Compile kernel with the retpoline compiler options to guard against
|