Lines Matching full:indirect

62 execution of indirect branches to leak privileged memory.
93 execution of indirect branches :ref:`[3] <spec_ref3>`. The indirect
95 indirect branches can be influenced by an attacker, causing gadget code
102 In Spectre variant 2 attacks, the attacker can steer speculative indirect
104 buffer of a CPU used for predicting indirect branch addresses. Such
105 poisoning could be done by indirect branching into existing code,
106 with the address offset of the indirect branch under the attacker's
109 this could cause privileged code's indirect branch to jump to a gadget
130 steer its indirect branch speculations to gadget code, and measure the
135 Branch History Buffer (BHB) to speculatively steer an indirect branch
137 associated with the source address of the indirect branch. Specifically,
207 target buffer on indirect jump and jump to gadget code in speculative
218 indirect branches. Return trampolines trap speculative execution paths
220 x86 CPUs with Enhanced Indirect Branch Restricted Speculation
227 attacks on x86, Indirect Branch Restricted Speculation (IBRS) feature
246 influence the indirect branch targets for a victim process that either
251 by using the prctl() syscall to disable indirect branch speculation
254 indirect branch speculation. This comes with a performance cost
255 from not using indirect branch speculation and clearing the branch
257 indirect branch speculation disabled, Single Threaded Indirect Branch
260 the Indirect Branch Prediction Barrier (IBPB) is issued to clear the
290 for indirect branches to bypass the poisoned branch target buffer,
292 guests from affecting indirect branching in the host kernel.
295 indirect branch speculation disabled via prctl(). The branch target
321 by turning off the unsafe guest's indirect branch speculation via
364 1. Indirect Branch Prediction Barrier (IBPB) to add additional
366 2. Single Thread Indirect Branch Predictors (STIBP) to add additional
390 - Firmware status: Show if Indirect Branch Restricted Speculation (IBRS) is
397 - Indirect branch prediction barrier (IBPB) status for protection between
405 'IBPB: conditional' Use IBPB on SECCOMP or indirect branch restricted tasks
408 - Single threaded indirect branch prediction (STIBP) status for protection
416 'STIBP: conditional' Use STIBP on SECCOMP or indirect branch restricted tasks
464 For Spectre variant 2 mitigation, the compiler turns indirect calls or
501 On x86, indirect branch restricted speculation is turned on by default
516 can be compiled with return trampolines for indirect branches.
522 can disable indirect branch speculation via prctl() (See
528 Restricting indirect branch speculation on a user program will
534 Programs that disable their indirect branch speculation will have
565 its indirect branch speculation disabled by administrator via prctl().
587 (indirect branch prediction) vulnerability. System may
595 (indirect branch speculation) vulnerability.
625 retpoline,lfence LFENCE; indirect branch
658 disabling indirect branch speculation when the program is running
665 off by disabling their indirect branch speculation when they are run
678 overhead as indirect branch speculations for all programs will be
687 whose indirect branch speculation is explicitly disabled,
713 … Single Thread Indirect Branch Predictors <https://software.intel.com/security-software-guidance/i…
719 [5] `AMD64 technology indirect branch control extension <https://developer.amd.com/wp-content/resou…