Home
last modified time | relevance | path

Searched refs:retpolines (Results 1 – 2 of 2) sorted by relevance

/Linux-v6.6/arch/x86/kernel/
Dmodule.c280 *retpolines = NULL, *returns = NULL, *ibt_endbr = NULL, in module_finalize() local
296 retpolines = s; in module_finalize()
315 if (retpolines || cfi) { in module_finalize()
319 if (retpolines) { in module_finalize()
320 rseg = (void *)retpolines->sh_addr; in module_finalize()
321 rsize = retpolines->sh_size; in module_finalize()
331 if (retpolines) { in module_finalize()
332 void *rseg = (void *)retpolines->sh_addr; in module_finalize()
333 apply_retpolines(rseg, rseg + retpolines->sh_size); in module_finalize()
/Linux-v6.6/Documentation/admin-guide/hw-vuln/
Dspectre.rst143 unprivileged eBPF, especially when eIBRS is used (without retpolines).
145 retpolines (or eIBRS combined with retpolines).
465 jumps in the kernel into equivalent return trampolines (retpolines)
467 addresses. Speculative execution paths under retpolines are trapped