Home
last modified time | relevance | path

Searched refs:Speculative (Results 1 – 15 of 15) sorted by relevance

/linux/rust/syn/
H A Ddiscouraged.rs15 pub trait Speculative { trait
169 impl<'a> Speculative for ParseBuffer<'a> {
H A Drestriction.rs66 use crate::parse::discouraged::Speculative as _;
H A Ddata.rs250 use crate::parse::discouraged::Speculative as _;
H A Dstmt.rs91 use crate::parse::discouraged::Speculative as _;
H A Dattr.rs654 use crate::parse::discouraged::Speculative as _;
H A Ditem.rs927 use crate::parse::discouraged::Speculative as _;
H A Dexpr.rs1201 use crate::parse::discouraged::Speculative as _;
/linux/arch/sh/
H A DKconfig.cpu66 bool "Speculative subroutine return"
/linux/Documentation/admin-guide/hw-vuln/
H A Drsb.rst139 variant [#retbleed-paper]_ [#amd-btc]_ or by Speculative Return Stack
236 .. [#amd-ibpb-no-rsb] `Spectre Attacks: Exploiting Speculative Execution <https://comsec.ethz.ch/wp…
250 .. [#retbleed-paper] `RETBleed: Arbitrary Speculative Code Execution with Return Instruction <https…
254 .. [#amd-srso] `Technical Update Regarding Speculative Return Stack Overflow <https://www.amd.com/c…
H A Dspectre.rst8 bypassing access controls. Speculative execution side channel exploits
16 Speculative execution side channel methods affect a wide range of modern
483 addresses. Speculative execution paths under retpolines are trapped
717 [11] `Spectre Attacks: Exploiting Speculative Execution <https://spectreattack.com/spectre.pdf>`_.
/linux/Documentation/arch/powerpc/
H A Ddexcr.rst61 - Speculative Branch Hint Enable (SBHE)
/linux/tools/arch/x86/kcpuid/
H A Dcpuid.csv272 0x7, 0, edx, 31, spec_ctrl_ssbd , Speculative store bypass disable
836 0x80000008, 0, ebx, 24, amd_ssbd , Speculative Store Bypass Disable
837 0x80000008, 0, ebx, 25, virt_ssbd , virtualized SSBD (Speculative Store Bypass Disable)
/linux/arch/arm64/
H A DKconfig667 …bool "Cortex-A76: 1165522: Speculative AT instruction using out-of-context translation regime coul…
680 …bool "Cortex-A57/A72: 1319537: Speculative AT instruction using out-of-context translation regime …
693 …bool "Cortex-A55: 1530923: Speculative AT instruction using out-of-context translation regime coul…
1309 bool "Falkor E1041: Speculative instruction fetches might cause errant memory access"
/linux/Documentation/admin-guide/
H A Dkernel-parameters.txt4654 [HW,EARLY] Disable all mitigations for the Speculative
6629 Speculative Code Execution with Return Instructions)
7188 [HW,EARLY] Control Speculative Store Bypass (SSB) Disable mitigation
7189 (Speculative Store Bypass vulnerability)
7193 as "Speculative Store Bypass" in which recent stores
7205 This parameter controls whether the Speculative Store
7210 on - Unconditionally disable Speculative Store Bypass
7211 off - Unconditionally enable Speculative Store Bypass
7213 implementation of Speculative Store Bypass and
7218 prctl - Control Speculative Store Bypass per thread
[all …]
/linux/arch/x86/
H A DKconfig2642 Enable mitigation for RETBleed (Arbitrary Speculative Code Execution
2687 bool "Mitigate Speculative Store Bypass (SSB) hardware bug"
2690 Enable mitigation for Speculative Store Bypass (SSB). SSB is a