Home
last modified time | relevance | path

Searched refs:speculative (Results 1 – 12 of 12) sorted by relevance

/arch/x86/kvm/mmu/
Dspte.c85 gfn_t gfn, kvm_pfn_t pfn, u64 old_spte, bool speculative, in make_spte() argument
104 if (!speculative) in make_spte()
160 if (speculative) in make_spte()
Dspte.h247 gfn_t gfn, kvm_pfn_t pfn, u64 old_spte, bool speculative,
Dmmu.c2562 gfn_t gfn, kvm_pfn_t pfn, bool speculative, in set_spte() argument
2574 ret = make_spte(vcpu, pte_access, level, gfn, pfn, *sptep, speculative, in set_spte()
2589 gfn_t gfn, kvm_pfn_t pfn, bool speculative, in mmu_set_spte() argument
2623 speculative, true, host_writable); in mmu_set_spte()
/arch/alpha/lib/
Dev67-strchr.S59 cttz t0, a2 # U0 : speculative (in case we get a match)
76 cttz t3, a2 # U0 : speculative (in case we get a match)
Dev6-memset.S166 addq $5, 128, $4 # E : speculative target of next wh64
344 addq $5, 128, $4 # E : speculative target of next wh64
532 addq $5, 128, $4 # E : speculative target of next wh64
/arch/sh/
DKconfig.cpu69 This enables support for a speculative instruction fetch for
/arch/s390/kernel/
Dentry.S366 xgr %r1,%r1 # prevent speculative use
413 # clear user controlled register to prevent speculative use
693 # clear user controlled registers to prevent speculative use
767 # clear user controlled registers to prevent speculative use
967 # clear user controlled registers to prevent speculative use
1192 # clear user controlled registers to prevent speculative use
/arch/s390/
DKconfig555 regard to speculative execution.
567 prompt "Avoid speculative indirect branches in the kernel"
570 against kernel-to-user data leaks by avoiding speculative indirect
/arch/arm/mm/
DKconfig938 not perform speculative loads into the D-cache. For such
1111 on ARMv6 CPUs, but since they do not have aggressive speculative
/arch/x86/
DKconfig2422 bool "Mitigations for speculative execution vulnerabilities"
2426 speculative execution hardware vulnerabilities.
2445 bool "Avoid speculative indirect branches in kernel"
2449 kernel-to-user data leaks by avoiding speculative indirect
2487 bool "Mitigate speculative RAS overflow on AMD"
2508 unprivileged speculative access to data which was previously stored in
/arch/arm64/
DKconfig684 to prevent a speculative PAR_EL1 read.
748 the chance that any Cacheable alias exists through which speculative
/arch/arm/
DKconfig981 r3p*) erratum. A speculative memory access may cause a page table walk