Searched refs:Speculative (Results 1 – 15 of 15) sorted by relevance
| /linux/rust/syn/ |
| H A D | discouraged.rs | 15 pub trait Speculative { trait 169 impl<'a> Speculative for ParseBuffer<'a> {
|
| H A D | restriction.rs | 66 use crate::parse::discouraged::Speculative as _;
|
| H A D | data.rs | 250 use crate::parse::discouraged::Speculative as _;
|
| H A D | stmt.rs | 91 use crate::parse::discouraged::Speculative as _;
|
| H A D | attr.rs | 654 use crate::parse::discouraged::Speculative as _;
|
| H A D | item.rs | 927 use crate::parse::discouraged::Speculative as _;
|
| H A D | expr.rs | 1201 use crate::parse::discouraged::Speculative as _;
|
| /linux/arch/sh/ |
| H A D | Kconfig.cpu | 66 bool "Speculative subroutine return"
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | rsb.rst | 139 variant [#retbleed-paper]_ [#amd-btc]_ or by Speculative Return Stack 236 .. [#amd-ibpb-no-rsb] `Spectre Attacks: Exploiting Speculative Execution <https://comsec.ethz.ch/wp… 250 .. [#retbleed-paper] `RETBleed: Arbitrary Speculative Code Execution with Return Instruction <https… 254 .. [#amd-srso] `Technical Update Regarding Speculative Return Stack Overflow <https://www.amd.com/c…
|
| H A D | spectre.rst | 8 bypassing access controls. Speculative execution side channel exploits 16 Speculative execution side channel methods affect a wide range of modern 483 addresses. Speculative execution paths under retpolines are trapped 717 [11] `Spectre Attacks: Exploiting Speculative Execution <https://spectreattack.com/spectre.pdf>`_.
|
| /linux/Documentation/arch/powerpc/ |
| H A D | dexcr.rst | 61 - Speculative Branch Hint Enable (SBHE)
|
| /linux/tools/arch/x86/kcpuid/ |
| H A D | cpuid.csv | 272 0x7, 0, edx, 31, spec_ctrl_ssbd , Speculative store bypass disable 836 0x80000008, 0, ebx, 24, amd_ssbd , Speculative Store Bypass Disable 837 0x80000008, 0, ebx, 25, virt_ssbd , virtualized SSBD (Speculative Store Bypass Disable)
|
| /linux/arch/arm64/ |
| H A D | Kconfig | 667 …bool "Cortex-A76: 1165522: Speculative AT instruction using out-of-context translation regime coul… 680 …bool "Cortex-A57/A72: 1319537: Speculative AT instruction using out-of-context translation regime … 693 …bool "Cortex-A55: 1530923: Speculative AT instruction using out-of-context translation regime coul… 1309 bool "Falkor E1041: Speculative instruction fetches might cause errant memory access"
|
| /linux/Documentation/admin-guide/ |
| H A D | kernel-parameters.txt | 4654 [HW,EARLY] Disable all mitigations for the Speculative 6629 Speculative Code Execution with Return Instructions) 7188 [HW,EARLY] Control Speculative Store Bypass (SSB) Disable mitigation 7189 (Speculative Store Bypass vulnerability) 7193 as "Speculative Store Bypass" in which recent stores 7205 This parameter controls whether the Speculative Store 7210 on - Unconditionally disable Speculative Store Bypass 7211 off - Unconditionally enable Speculative Store Bypass 7213 implementation of Speculative Store Bypass and 7218 prctl - Control Speculative Store Bypass per thread [all …]
|
| /linux/arch/x86/ |
| H A D | Kconfig | 2642 Enable mitigation for RETBleed (Arbitrary Speculative Code Execution 2687 bool "Mitigate Speculative Store Bypass (SSB) hardware bug" 2690 Enable mitigation for Speculative Store Bypass (SSB). SSB is a
|