Searched refs:retpoline (Results 1 – 10 of 10) sorted by relevance
/openbmc/linux/tools/objtool/ |
H A D | builtin-check.c | 75 OPT_BOOLEAN('r', "retpoline", &opts.retpoline, "validate and annotate retpoline usage"), 140 opts.retpoline || in opts_valid()
|
H A D | check.c | 4691 if (opts.retpoline) { in check() 4755 if (opts.retpoline) { in check()
|
/openbmc/linux/tools/objtool/include/objtool/ |
H A D | builtin.h | 20 bool retpoline; member
|
/openbmc/linux/Documentation/admin-guide/hw-vuln/ |
H A D | spectre.rst | 216 "retpoline") :ref:`[3] <spec_ref3>` :ref:`[9] <spec_ref9>` for all 221 mitigate Spectre variant 2 instead of retpoline. Enhanced IBRS is 222 more efficient than retpoline. 357 retpoline mitigation or if the CPU has hardware mitigation, and if the 439 - System is protected by retpoline 487 To turn on retpoline mitigation on a vulnerable CPU, the kernel 516 The retpoline mitigation is turned on by default on vulnerable 644 retpoline,generic Retpolines 645 retpoline,lfence LFENCE; indirect branch 646 retpoline,amd alias for retpoline,lfence [all …]
|
H A D | srso.rst | 147 retpoline sequence. To accomplish this, the __x86_return_thunk forces
|
/openbmc/linux/arch/x86/lib/ |
H A D | Makefile | 39 lib-$(CONFIG_RETPOLINE) += retpoline.o
|
/openbmc/linux/scripts/ |
H A D | Makefile.lib | 265 objtool-args-$(CONFIG_RETPOLINE) += --retpoline
|
/openbmc/linux/tools/objtool/Documentation/ |
H A D | objtool.txt | 25 retpoline thunks, for Spectre v2 mitigations 27 - Retpoline call site annotation -- annotates all retpoline thunk call
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | kernel-parameters.txt | 5967 retpoline - replace indirect branches 5968 retpoline,generic - Retpolines 5969 retpoline,lfence - LFENCE; indirect branch 5970 retpoline,amd - alias for retpoline,lfence 5972 eibrs,retpoline - Enhanced/Auto IBRS + Retpolines
|
/openbmc/linux/arch/x86/ |
H A D | Kconfig | 2457 Compile kernel with the retpoline compiler options to guard against
|