Searched refs:retpoline (Results 1 – 9 of 9) sorted by relevance
/Linux-v6.1/tools/objtool/ |
D | builtin-check.c | 70 OPT_BOOLEAN('r', "retpoline", &opts.retpoline, "validate and annotate retpoline usage"), 127 opts.retpoline || in opts_valid()
|
D | check.c | 4229 if (opts.retpoline) { in check() 4293 if (opts.retpoline) { in check()
|
/Linux-v6.1/tools/objtool/include/objtool/ |
D | builtin.h | 21 bool retpoline; member
|
/Linux-v6.1/Documentation/admin-guide/hw-vuln/ |
D | spectre.rst | 217 "retpoline") :ref:`[3] <spec_ref3>` :ref:`[9] <spec_ref9>` for all 222 mitigate Spectre variant 2 instead of retpoline. Enhanced IBRS is 223 more efficient than retpoline. 358 retpoline mitigation or if the CPU has hardware mitigation, and if the 471 To turn on retpoline mitigation on a vulnerable CPU, the kernel 483 IBRS on x86), retpoline is automatically disabled at run time. 485 The retpoline mitigation is turned on by default on vulnerable 537 Linux kernel uses retpoline or Enhanced IBRS to prevent consumption of 609 retpoline auto pick between generic,lfence 610 retpoline,generic Retpolines [all …]
|
/Linux-v6.1/arch/x86/lib/ |
D | Makefile | 52 lib-$(CONFIG_RETPOLINE) += retpoline.o
|
/Linux-v6.1/scripts/ |
D | Makefile.lib | 260 objtool-args-$(CONFIG_RETPOLINE) += --retpoline
|
/Linux-v6.1/tools/objtool/Documentation/ |
D | objtool.txt | 25 retpoline thunks, for Spectre v2 mitigations 27 - Retpoline call site annotation -- annotates all retpoline thunk call
|
/Linux-v6.1/Documentation/admin-guide/ |
D | kernel-parameters.txt | 5697 retpoline - replace indirect branches 5698 retpoline,generic - Retpolines 5699 retpoline,lfence - LFENCE; indirect branch 5700 retpoline,amd - alias for retpoline,lfence 5702 eibrs,retpoline - enhanced IBRS + Retpolines
|
/Linux-v6.1/arch/x86/ |
D | Kconfig | 2474 Compile kernel with the retpoline compiler options to guard against
|