Searched refs:speculative (Results 1 – 25 of 40) sorted by relevance
12
/linux-6.12.1/Documentation/admin-guide/hw-vuln/ |
D | spectre.rst | 7 and speculative execution on modern CPUs to read memory, possibly 18 use branch prediction and speculative execution. 53 CPUs use speculative operations to improve performance. That may leave 56 influence the speculative execution paths, and then use the side effects 57 of the speculative execution in the CPUs' caches and buffers to infer 58 privileged data touched during the speculative execution. 60 Spectre variant 1 attacks take advantage of speculative execution of 61 conditional branches, while Spectre variant 2 attacks use speculative 70 of speculative execution that bypasses conditional branch instructions 74 done speculatively before validation checks resolve. Such speculative [all …]
|
D | srso.rst | 6 This is a mitigation for the speculative return stack overflow (SRSO) 22 control the speculative target of a subsequent kernel RET, potentially 23 leading to information disclosure via a speculative side-channel.
|
D | tsx_async_abort.rst | 6 TAA is a hardware vulnerability that allows unprivileged speculative access to 29 microprocessors utilizing speculative execution may
|
D | mds.rst | 5 unprivileged speculative access to data which is available in various CPU 54 may be able to forward this speculative data to a disclosure gadget which
|
D | gather_data_sampling.rst | 7 speculative access to data which was previously stored in vector registers.
|
D | l1tf.rst | 5 speculative access to data which is available in the Level 1 Data Cache 48 then speculative execution ignores the invalid PTE and loads the referenced 52 While this is a purely speculative mechanism and the instruction will raise 54 data and making it available to other speculative instructions opens up the
|
/linux-6.12.1/Documentation/ABI/testing/ |
D | configfs-most | 59 creation of the link. In case of speculative 114 creation of the link. In case of speculative 169 creation of the link. In case of speculative 235 creation of the link. In case of speculative
|
/linux-6.12.1/arch/alpha/lib/ |
D | ev67-strchr.S | 59 cttz t0, a2 # U0 : speculative (in case we get a match) 76 cttz t3, a2 # U0 : speculative (in case we get a match)
|
D | ev6-memset.S | 166 addq $5, 128, $4 # E : speculative target of next wh64 344 addq $5, 128, $4 # E : speculative target of next wh64 532 addq $5, 128, $4 # E : speculative target of next wh64
|
/linux-6.12.1/Documentation/staging/ |
D | speculation.rst | 11 employ speculative execution techniques such as branch prediction, performing 14 Typically speculative execution cannot be observed from architectural state,
|
/linux-6.12.1/kernel/bpf/ |
D | Kconfig | 62 Enables BPF JIT and removes BPF interpreter to avoid speculative 85 speculative execution side-channel vulnerabilities on unmitigated
|
/linux-6.12.1/arch/s390/kernel/ |
D | entry.S | 240 xgr %r1,%r1 # prevent speculative use 278 # clear user controlled register to prevent speculative use
|
/linux-6.12.1/tools/perf/util/ |
D | parse-events.l | 257 lc_op_result (load|loads|read|store|stores|write|prefetch|prefetches|speculative-read|speculative-l…
|
/linux-6.12.1/arch/sh/ |
D | Kconfig.cpu | 69 This enables support for a speculative instruction fetch for
|
/linux-6.12.1/tools/perf/Documentation/ |
D | perf-arm-spe.txt | 107 The coarse effect of conversions, and, if applicable, sampling of speculative operations, can be 159 bit 1 - instruction retired (i.e. omit speculative instructions)
|
/linux-6.12.1/Documentation/filesystems/ext4/ |
D | allocators.rst | 21 unused speculative allocations are of course freed, but if the
|
/linux-6.12.1/Documentation/driver-api/mmc/ |
D | mmc-async-req.rst | 10 It depends. Fast eMMC and multiple cache levels with speculative cache
|
/linux-6.12.1/drivers/staging/most/Documentation/ |
D | driver_usage.txt | 154 case of speculative configuration, the creation is post-poned until 175 In case of speculative configuration, the creation is post-poned
|
/linux-6.12.1/arch/x86/ |
D | Kconfig | 2500 vulnerabilities (usually related to speculative execution). 2523 bool "Avoid speculative indirect branches in kernel" 2528 kernel-to-user data leaks by avoiding speculative indirect 2598 bool "Mitigate speculative RAS overflow on AMD" 2620 vulnerability which allows unprivileged speculative access to data 2631 allows unprivileged speculative access to stale data previously 2651 a hardware vulnerability which allows unprivileged speculative access 2661 vulnerability that allows unprivileged speculative access to data 2684 hardware vulnerability which allows unprivileged speculative access to data 2694 with Return Instructions) vulnerability. RETBleed is a speculative [all …]
|
/linux-6.12.1/include/linux/ |
D | bpf_verifier.h | 438 bool speculative; member
|
/linux-6.12.1/arch/s390/ |
D | Kconfig | 560 regard to speculative execution. 573 prompt "Avoid speculative indirect branches in the kernel" 576 against kernel-to-user data leaks by avoiding speculative indirect
|
/linux-6.12.1/Documentation/translations/ko_KR/ |
D | memory-barriers.txt | 394 유예, 메모리 오퍼레이션들의 조합, 예측적 로드(speculative load), 브랜치 395 예측(speculative branch prediction), 다양한 종류의 캐싱(caching) 등의 다양한
|
/linux-6.12.1/tools/testing/selftests/bpf/ |
D | README.rst | 145 verifier to understand such speculative pointer arithmetic.
|
/linux-6.12.1/fs/afs/ |
D | inode.c | 303 if (vp->speculative && in afs_vnode_commit_status()
|
/linux-6.12.1/drivers/perf/ |
D | xgene_pmu.c | 350 XGENE_PMU_EVENT_ATTR(mcu-rd-proceed-speculative-all, 0x19), 351 XGENE_PMU_EVENT_ATTR(mcu-rd-proceed-speculative-cancel, 0x1a),
|
12