Searched refs:speculative (Results 1 – 12 of 12) sorted by relevance
/arch/x86/kvm/mmu/ |
D | spte.c | 85 gfn_t gfn, kvm_pfn_t pfn, u64 old_spte, bool speculative, in make_spte() argument 104 if (!speculative) in make_spte() 160 if (speculative) in make_spte()
|
D | spte.h | 247 gfn_t gfn, kvm_pfn_t pfn, u64 old_spte, bool speculative,
|
D | mmu.c | 2562 gfn_t gfn, kvm_pfn_t pfn, bool speculative, in set_spte() argument 2574 ret = make_spte(vcpu, pte_access, level, gfn, pfn, *sptep, speculative, in set_spte() 2589 gfn_t gfn, kvm_pfn_t pfn, bool speculative, in mmu_set_spte() argument 2623 speculative, true, host_writable); in mmu_set_spte()
|
/arch/alpha/lib/ |
D | ev67-strchr.S | 59 cttz t0, a2 # U0 : speculative (in case we get a match) 76 cttz t3, a2 # U0 : speculative (in case we get a match)
|
D | ev6-memset.S | 166 addq $5, 128, $4 # E : speculative target of next wh64 344 addq $5, 128, $4 # E : speculative target of next wh64 532 addq $5, 128, $4 # E : speculative target of next wh64
|
/arch/sh/ |
D | Kconfig.cpu | 69 This enables support for a speculative instruction fetch for
|
/arch/s390/kernel/ |
D | entry.S | 366 xgr %r1,%r1 # prevent speculative use 413 # clear user controlled register to prevent speculative use 693 # clear user controlled registers to prevent speculative use 767 # clear user controlled registers to prevent speculative use 967 # clear user controlled registers to prevent speculative use 1192 # clear user controlled registers to prevent speculative use
|
/arch/s390/ |
D | Kconfig | 555 regard to speculative execution. 567 prompt "Avoid speculative indirect branches in the kernel" 570 against kernel-to-user data leaks by avoiding speculative indirect
|
/arch/arm/mm/ |
D | Kconfig | 938 not perform speculative loads into the D-cache. For such 1111 on ARMv6 CPUs, but since they do not have aggressive speculative
|
/arch/x86/ |
D | Kconfig | 2422 bool "Mitigations for speculative execution vulnerabilities" 2426 speculative execution hardware vulnerabilities. 2445 bool "Avoid speculative indirect branches in kernel" 2449 kernel-to-user data leaks by avoiding speculative indirect 2487 bool "Mitigate speculative RAS overflow on AMD" 2508 unprivileged speculative access to data which was previously stored in
|
/arch/arm64/ |
D | Kconfig | 684 to prevent a speculative PAR_EL1 read. 748 the chance that any Cacheable alias exists through which speculative
|
/arch/arm/ |
D | Kconfig | 981 r3p*) erratum. A speculative memory access may cause a page table walk
|