Searched refs:speculative (Results 1 – 10 of 10) sorted by relevance
/arch/alpha/lib/ |
D | ev67-strchr.S | 59 cttz t0, a2 # U0 : speculative (in case we get a match) 76 cttz t3, a2 # U0 : speculative (in case we get a match)
|
D | ev6-memset.S | 166 addq $5, 128, $4 # E : speculative target of next wh64 344 addq $5, 128, $4 # E : speculative target of next wh64 532 addq $5, 128, $4 # E : speculative target of next wh64
|
/arch/sh/ |
D | Kconfig.cpu | 74 This enables support for a speculative instruction fetch for
|
/arch/s390/kernel/ |
D | entry.S | 312 xgr %r1,%r1 # prevent speculative use 359 # clear user controlled register to prevent speculative use 650 # clear user controlled registers to prevent speculative use 726 # clear user controlled registers to prevent speculative use 955 # clear user controlled registers to prevent speculative use 1179 # clear user controlled registers to prevent speculative use
|
/arch/s390/ |
D | Kconfig | 590 regard to speculative execution. 602 prompt "Avoid speculative indirect branches in the kernel" 605 against kernel-to-user data leaks by avoiding speculative indirect
|
/arch/x86/kvm/ |
D | mmu.c | 3046 gfn_t gfn, kvm_pfn_t pfn, bool speculative, in set_spte() argument 3069 if (!speculative) in set_spte() 3138 if (speculative) in set_spte() 3150 bool speculative, bool host_writable) in mmu_set_spte() argument 3184 speculative, true, host_writable); in mmu_set_spte()
|
/arch/arm/mm/ |
D | Kconfig | 923 not perform speculative loads into the D-cache. For such 1096 on ARMv6 CPUs, but since they do not have aggressive speculative
|
/arch/x86/ |
D | Kconfig | 447 bool "Avoid speculative indirect branches in kernel" 452 kernel-to-user data leaks by avoiding speculative indirect
|
/arch/arm64/ |
D | Kconfig | 1129 by speculative loads.
|
/arch/arm/ |
D | Kconfig | 976 r3p*) erratum. A speculative memory access may cause a page table walk
|