Searched refs:retpoline (Results 1 – 9 of 9) sorted by relevance
/linux-6.1.9/tools/objtool/ |
D | builtin-check.c | 70 OPT_BOOLEAN('r', "retpoline", &opts.retpoline, "validate and annotate retpoline usage"), 127 opts.retpoline || in opts_valid()
|
D | check.c | 4239 if (opts.retpoline) { in check() 4303 if (opts.retpoline) { in check()
|
/linux-6.1.9/tools/objtool/include/objtool/ |
D | builtin.h | 21 bool retpoline; member
|
/linux-6.1.9/Documentation/admin-guide/hw-vuln/ |
D | spectre.rst | 217 "retpoline") :ref:`[3] <spec_ref3>` :ref:`[9] <spec_ref9>` for all 222 mitigate Spectre variant 2 instead of retpoline. Enhanced IBRS is 223 more efficient than retpoline. 358 retpoline mitigation or if the CPU has hardware mitigation, and if the 471 To turn on retpoline mitigation on a vulnerable CPU, the kernel 483 IBRS on x86), retpoline is automatically disabled at run time. 485 The retpoline mitigation is turned on by default on vulnerable 537 Linux kernel uses retpoline or Enhanced IBRS to prevent consumption of 609 retpoline auto pick between generic,lfence 610 retpoline,generic Retpolines [all …]
|
/linux-6.1.9/arch/x86/lib/ |
D | Makefile | 52 lib-$(CONFIG_RETPOLINE) += retpoline.o
|
/linux-6.1.9/scripts/ |
D | Makefile.lib | 260 objtool-args-$(CONFIG_RETPOLINE) += --retpoline
|
/linux-6.1.9/tools/objtool/Documentation/ |
D | objtool.txt | 25 retpoline thunks, for Spectre v2 mitigations 27 - Retpoline call site annotation -- annotates all retpoline thunk call
|
/linux-6.1.9/Documentation/admin-guide/ |
D | kernel-parameters.txt | 5714 retpoline - replace indirect branches 5715 retpoline,generic - Retpolines 5716 retpoline,lfence - LFENCE; indirect branch 5717 retpoline,amd - alias for retpoline,lfence 5719 eibrs,retpoline - enhanced IBRS + Retpolines
|
/linux-6.1.9/arch/x86/ |
D | Kconfig | 2474 Compile kernel with the retpoline compiler options to guard against
|