/linux/Documentation/arch/arm64/ |
H A D | gcs.rst | 2 Guarded Control Stack support for AArch64 Linux 6 order to support use of the ARM Guarded Control Stack (GCS) feature. 36 Stack feature, due to sharing of userspace interfaces the ABI refers to 68 * When set PR_SHADOW_STACK_ENABLE flag allocates a Guarded Control Stack 76 by GCSCRE0_EL1.STREn, allowing explicit stores to the Guarded Control Stack. 116 * When GCS is enabled for a thread a new Guarded Control Stack will be 121 new Guarded Control Stack will be allocated for the new thread with 146 * When a thread is freed the Guarded Control Stack initially allocated for 226 * Guarded Control Stack pages will include "ss" in their VmFlags in
|
/linux/Documentation/admin-guide/hw-vuln/ |
H A D | rsb.rst | 12 Since 2018 there have been many Spectre CVEs related to the Return Stack 13 Buffer (RSB) (sometimes referred to as the Return Address Stack (RAS) or 131 Stack Buffer Predictions (PBRSB) [#intel-pbrsb]_, where the last 139 variant [#retbleed-paper]_ [#amd-btc]_ or by Speculative Return Stack 153 of RETBleed [#retbleed-paper]_ (Return Stack Buffer Underflow 224 .. [#spectre-rsb] `Spectre Returns! Speculation Attacks using the Return Stack Buffer <https://arxi… 238 .. [#intel-ibpb-rsb] "Introduction" in `Post-barrier Return Stack Buffer Predictions / CVE-2022-263… 248 .. [#intel-pbrsb] `Post-barrier Return Stack Buffer Predictions / CVE-2022-26373 / INTEL-SA-00706 <… 254 .. [#amd-srso] `Technical Update Regarding Speculative Return Stack Overflow <https://www.amd.com/c… 258 .. [#intel-rsbu] `Return Stack Buffer Underflow / Return Stack Buffer Underflow / CVE-2022-29901, C… [all …]
|
H A D | srso.rst | 3 Speculative Return Stack Overflow (SRSO) 14 Return Address Stack/Return Stack Buffer). In some cases, a non-architectural
|
/linux/tools/perf/scripts/python/ |
H A D | gecko.py | 81 class Stack(NamedTuple): class 124 stackTable: List[Stack] = field(default_factory=list) 136 self.stackTable.append(Stack(prefix_id=prefix_id, frame_id=frame_id))
|
/linux/Documentation/arch/x86/ |
H A D | shstk.rst | 4 Control-flow Enforcement Technology (CET) Shadow Stack 22 Stack and Indirect Branch Tracking. Today in the 64-bit kernel, only userspace 25 Requirements to use Shadow Stack 114 Implementation of the Shadow Stack 117 Shadow Stack Size
|
/linux/arch/x86/configs/ |
H A D | hardening.config | 16 # Enable CET Shadow Stack for userspace.
|
/linux/arch/arm64/configs/ |
H A D | hardening.config | 6 # Software Shadow Stack or PAC
|
/linux/drivers/target/iscsi/ |
H A D | Kconfig | 3 tristate "SCSI Target Mode Stack"
|
/linux/tools/testing/kunit/test_data/ |
H A D | test_kernel_panic_interrupt.log | 23 [ 0.060000] Stack:
|
H A D | test_config_printk_time.log | 29 [ 0.060000] Stack:
|
H A D | test_pound_sign.log | 31 [ 0.060000] Stack:
|
H A D | test_output_with_prefix_isolated_correctly.log | 30 [ 0.060000] Stack:
|
H A D | test_pound_no_prefix.log | 31 Stack:
|
H A D | test_multiple_prefixes.log | 29 [ 0.060000][ T1] Stack:
|
H A D | test_interrupted_tap_output.log | 35 [ 0.060000] Stack:
|
/linux/net/mac802154/ |
H A D | Kconfig | 3 tristate "Generic IEEE 802.15.4 Soft Networking Stack (mac802154)"
|
/linux/Documentation/driver-api/mei/ |
H A D | nfc.rst | 14 :caption: **MEI NFC** Stack
|
/linux/arch/x86/kvm/ |
H A D | emulate.c | 123 #define Stack (1<<14) /* Stack instruction (push/pop) */ macro 4037 I(DstMem | SrcNone | Mov | Stack | IncSP | TwoMemOp, em_pop), N, N, N, N, N, N, N, 4075 I(SrcMem | Stack | TwoMemOp, em_push), D(Undefined), 4247 I(ImplicitOps | Stack | No64 | Src2ES, em_push_sreg), 4248 I(ImplicitOps | Stack | No64 | Src2ES, em_pop_sreg), 4251 I(ImplicitOps | Stack | No64 | Src2CS, em_push_sreg), 4255 I(ImplicitOps | Stack | No64 | Src2SS, em_push_sreg), 4256 I(ImplicitOps | Stack | No64 | Src2SS, em_pop_sreg), 4259 I(ImplicitOps | Stack | No64 | Src2DS, em_push_sreg), 4260 I(ImplicitOps | Stack | No64 | Src2DS, em_pop_sreg), [all …]
|
/linux/arch/xtensa/ |
H A D | Kconfig.debug | 36 int "Stack depth to print" if DEBUG_KERNEL
|
/linux/Documentation/arch/powerpc/ |
H A D | syscall64-abi.rst | 42 Stack section in syscall 132 Stack section in vsyscall
|
/linux/Documentation/networking/caif/ |
H A D | linux_caif.rst | 101 Stack and provides a Client interface for adding Link-Layer and 102 Driver interfaces on top of the CAIF Stack.
|
/linux/Documentation/mm/ |
H A D | vmalloced-kernel-stacks.rst | 4 Virtually Mapped Kernel Stack Support 120 Stack overflow handling
|
/linux/Documentation/gpu/ |
H A D | introduction.rst | 155 * `An Overview of the Linux and Userspace Graphics Stack <https://www.youtube.com/watch?v=wjAJmqwg4… 169 * `Understanding the Linux Graphics Stack <https://bootlin.com/doc/training/graphics/graphics-slide… 176 * `The Linux Graphics Stack <https://blog.mecheye.net/2012/06/the-linux-graphics-stack/>`_ - Jasper…
|
/linux/arch/xtensa/boot/boot-redboot/ |
H A D | bootstrap.S | 176 # a1 Stack
|
/linux/Documentation/networking/device_drivers/ethernet/freescale/dpaa2/ |
H A D | dpio-driver.rst | 68 | Stack |
|