Home
last modified time | relevance | path

Searched refs:retpoline (Results 1 – 10 of 10) sorted by relevance

/openbmc/linux/tools/objtool/
H A Dbuiltin-check.c75 OPT_BOOLEAN('r', "retpoline", &opts.retpoline, "validate and annotate retpoline usage"),
140 opts.retpoline || in opts_valid()
H A Dcheck.c4691 if (opts.retpoline) { in check()
4755 if (opts.retpoline) { in check()
/openbmc/linux/tools/objtool/include/objtool/
H A Dbuiltin.h20 bool retpoline; member
/openbmc/linux/Documentation/admin-guide/hw-vuln/
H A Dspectre.rst216 "retpoline") :ref:`[3] <spec_ref3>` :ref:`[9] <spec_ref9>` for all
221 mitigate Spectre variant 2 instead of retpoline. Enhanced IBRS is
222 more efficient than retpoline.
357 retpoline mitigation or if the CPU has hardware mitigation, and if the
439 - System is protected by retpoline
487 To turn on retpoline mitigation on a vulnerable CPU, the kernel
516 The retpoline mitigation is turned on by default on vulnerable
644 retpoline,generic Retpolines
645 retpoline,lfence LFENCE; indirect branch
646 retpoline,amd alias for retpoline,lfence
[all …]
H A Dsrso.rst147 retpoline sequence. To accomplish this, the __x86_return_thunk forces
/openbmc/linux/arch/x86/lib/
H A DMakefile39 lib-$(CONFIG_RETPOLINE) += retpoline.o
/openbmc/linux/scripts/
H A DMakefile.lib265 objtool-args-$(CONFIG_RETPOLINE) += --retpoline
/openbmc/linux/tools/objtool/Documentation/
H A Dobjtool.txt25 retpoline thunks, for Spectre v2 mitigations
27 - Retpoline call site annotation -- annotates all retpoline thunk call
/openbmc/linux/Documentation/admin-guide/
H A Dkernel-parameters.txt5967 retpoline - replace indirect branches
5968 retpoline,generic - Retpolines
5969 retpoline,lfence - LFENCE; indirect branch
5970 retpoline,amd - alias for retpoline,lfence
5972 eibrs,retpoline - Enhanced/Auto IBRS + Retpolines
/openbmc/linux/arch/x86/
H A DKconfig2457 Compile kernel with the retpoline compiler options to guard against