Home
last modified time | relevance | path

Searched refs:speculative (Results 1 – 10 of 10) sorted by relevance

/arch/alpha/lib/
Dev67-strchr.S59 cttz t0, a2 # U0 : speculative (in case we get a match)
76 cttz t3, a2 # U0 : speculative (in case we get a match)
Dev6-memset.S166 addq $5, 128, $4 # E : speculative target of next wh64
344 addq $5, 128, $4 # E : speculative target of next wh64
532 addq $5, 128, $4 # E : speculative target of next wh64
/arch/sh/
DKconfig.cpu74 This enables support for a speculative instruction fetch for
/arch/s390/kernel/
Dentry.S312 xgr %r1,%r1 # prevent speculative use
359 # clear user controlled register to prevent speculative use
650 # clear user controlled registers to prevent speculative use
726 # clear user controlled registers to prevent speculative use
955 # clear user controlled registers to prevent speculative use
1179 # clear user controlled registers to prevent speculative use
/arch/s390/
DKconfig590 regard to speculative execution.
602 prompt "Avoid speculative indirect branches in the kernel"
605 against kernel-to-user data leaks by avoiding speculative indirect
/arch/x86/kvm/
Dmmu.c3046 gfn_t gfn, kvm_pfn_t pfn, bool speculative, in set_spte() argument
3069 if (!speculative) in set_spte()
3138 if (speculative) in set_spte()
3150 bool speculative, bool host_writable) in mmu_set_spte() argument
3184 speculative, true, host_writable); in mmu_set_spte()
/arch/arm/mm/
DKconfig923 not perform speculative loads into the D-cache. For such
1096 on ARMv6 CPUs, but since they do not have aggressive speculative
/arch/x86/
DKconfig447 bool "Avoid speculative indirect branches in kernel"
452 kernel-to-user data leaks by avoiding speculative indirect
/arch/arm64/
DKconfig1129 by speculative loads.
/arch/arm/
DKconfig976 r3p*) erratum. A speculative memory access may cause a page table walk