Searched refs:speculative (Results 1 – 12 of 12) sorted by relevance
/arch/x86/kvm/mmu/ |
D | spte.c | 93 gfn_t gfn, kvm_pfn_t pfn, u64 old_spte, bool speculative, in make_spte() argument 112 if (!speculative) in make_spte() 174 if (speculative) in make_spte()
|
D | spte.h | 338 gfn_t gfn, kvm_pfn_t pfn, u64 old_spte, bool speculative,
|
D | mmu.c | 2697 gfn_t gfn, kvm_pfn_t pfn, bool speculative, in set_spte() argument 2706 ret = make_spte(vcpu, pte_access, level, gfn, pfn, *sptep, speculative, in set_spte() 2721 gfn_t gfn, kvm_pfn_t pfn, bool speculative, in mmu_set_spte() argument 2759 speculative, true, host_writable); in mmu_set_spte()
|
/arch/alpha/lib/ |
D | ev67-strchr.S | 59 cttz t0, a2 # U0 : speculative (in case we get a match) 76 cttz t3, a2 # U0 : speculative (in case we get a match)
|
D | ev6-memset.S | 166 addq $5, 128, $4 # E : speculative target of next wh64 344 addq $5, 128, $4 # E : speculative target of next wh64 532 addq $5, 128, $4 # E : speculative target of next wh64
|
/arch/sh/ |
D | Kconfig.cpu | 69 This enables support for a speculative instruction fetch for
|
/arch/s390/kernel/ |
D | entry.S | 277 xgr %r1,%r1 # prevent speculative use 315 # clear user controlled register to prevent speculative use
|
/arch/s390/ |
D | Kconfig | 564 regard to speculative execution. 576 prompt "Avoid speculative indirect branches in the kernel" 579 against kernel-to-user data leaks by avoiding speculative indirect
|
/arch/arm/mm/ |
D | Kconfig | 935 not perform speculative loads into the D-cache. For such 1108 on ARMv6 CPUs, but since they do not have aggressive speculative
|
/arch/x86/ |
D | Kconfig | 2398 bool "Mitigations for speculative execution vulnerabilities" 2402 speculative execution hardware vulnerabilities. 2421 bool "Avoid speculative indirect branches in kernel" 2425 kernel-to-user data leaks by avoiding speculative indirect 2463 bool "Mitigate speculative RAS overflow on AMD" 2484 unprivileged speculative access to data which was previously stored in
|
/arch/arm/ |
D | Kconfig | 930 r3p*) erratum. A speculative memory access may cause a page table walk
|
/arch/arm64/ |
D | Kconfig | 711 to prevent a speculative PAR_EL1 read.
|