Home
last modified time | relevance | path

Searched refs:retpoline (Results 1 – 8 of 8) sorted by relevance

/Linux-v5.4/tools/objtool/
Dbuiltin-check.c20 bool no_fp, no_unreachable, retpoline, module, backtrace, uaccess; variable
30 OPT_BOOLEAN('r', "retpoline", &retpoline, "Validate retpoline assumptions"),
Dbuiltin.h11 extern bool no_fp, no_unreachable, retpoline, module, backtrace, uaccess;
Dcheck.c668 if (retpoline) in add_call_destinations()
2451 if (retpoline) { in check()
/Linux-v5.4/Documentation/admin-guide/hw-vuln/
Dspectre.rst204 "retpoline") :ref:`[3] <spec_ref3>` :ref:`[9] <spec_ref9>` for all
209 mitigate Spectre variant 2 instead of retpoline. Enhanced IBRS is
210 more efficient than retpoline.
345 retpoline mitigation or if the CPU has hardware mitigation, and if the
370 'Mitigation: Full generic retpoline' Software-focused mitigation
371 'Mitigation: Full AMD retpoline' AMD-specific software mitigation
448 To turn on retpoline mitigation on a vulnerable CPU, the kernel
460 IBRS on x86), retpoline is automatically disabled at run time.
462 The retpoline mitigation is turned on by default on vulnerable
515 Linux kernel uses retpoline or Enhanced IBRS to prevent consumption of
[all …]
/Linux-v5.4/arch/x86/lib/
DMakefile41 lib-$(CONFIG_RETPOLINE) += retpoline.o
/Linux-v5.4/scripts/
DMakefile.build210 objtool_args += --retpoline
/Linux-v5.4/Documentation/admin-guide/
Dkernel-parameters.txt4466 retpoline - replace indirect branches
4467 retpoline,generic - google's original retpoline
4468 retpoline,amd - AMD-specific minimal thunk
/Linux-v5.4/arch/x86/
DKconfig449 Compile kernel with the retpoline compiler options to guard against