Home
last modified time | relevance | path

Searched refs:retpoline (Results 1 – 10 of 10) sorted by relevance

/Linux-v6.6/tools/objtool/
Dbuiltin-check.c75 OPT_BOOLEAN('r', "retpoline", &opts.retpoline, "validate and annotate retpoline usage"),
140 opts.retpoline || in opts_valid()
Dcheck.c4679 if (opts.retpoline) { in check()
4743 if (opts.retpoline) { in check()
/Linux-v6.6/tools/objtool/include/objtool/
Dbuiltin.h20 bool retpoline; member
/Linux-v6.6/Documentation/admin-guide/hw-vuln/
Dspectre.rst217 "retpoline") :ref:`[3] <spec_ref3>` :ref:`[9] <spec_ref9>` for all
222 mitigate Spectre variant 2 instead of retpoline. Enhanced IBRS is
223 more efficient than retpoline.
358 retpoline mitigation or if the CPU has hardware mitigation, and if the
471 To turn on retpoline mitigation on a vulnerable CPU, the kernel
483 or enhanced IBRS on x86), retpoline is automatically disabled at run time.
496 The retpoline mitigation is turned on by default on vulnerable
551 Linux kernel uses retpoline or Enhanced IBRS to prevent consumption of
623 retpoline auto pick between generic,lfence
624 retpoline,generic Retpolines
[all …]
Dsrso.rst137 retpoline sequence. To accomplish this, the __x86_return_thunk forces
/Linux-v6.6/arch/x86/lib/
DMakefile52 lib-$(CONFIG_RETPOLINE) += retpoline.o
/Linux-v6.6/scripts/
DMakefile.lib265 objtool-args-$(CONFIG_RETPOLINE) += --retpoline
/Linux-v6.6/tools/objtool/Documentation/
Dobjtool.txt25 retpoline thunks, for Spectre v2 mitigations
27 - Retpoline call site annotation -- annotates all retpoline thunk call
/Linux-v6.6/Documentation/admin-guide/
Dkernel-parameters.txt5923 retpoline - replace indirect branches
5924 retpoline,generic - Retpolines
5925 retpoline,lfence - LFENCE; indirect branch
5926 retpoline,amd - alias for retpoline,lfence
5928 eibrs,retpoline - Enhanced/Auto IBRS + Retpolines
/Linux-v6.6/arch/x86/
DKconfig2465 Compile kernel with the retpoline compiler options to guard against