Home
last modified time | relevance | path

Searched refs:speculative (Results 1 – 12 of 12) sorted by relevance

/arch/x86/kvm/mmu/
Dspte.c93 gfn_t gfn, kvm_pfn_t pfn, u64 old_spte, bool speculative, in make_spte() argument
112 if (!speculative) in make_spte()
174 if (speculative) in make_spte()
Dspte.h338 gfn_t gfn, kvm_pfn_t pfn, u64 old_spte, bool speculative,
Dmmu.c2697 gfn_t gfn, kvm_pfn_t pfn, bool speculative, in set_spte() argument
2706 ret = make_spte(vcpu, pte_access, level, gfn, pfn, *sptep, speculative, in set_spte()
2721 gfn_t gfn, kvm_pfn_t pfn, bool speculative, in mmu_set_spte() argument
2759 speculative, true, host_writable); in mmu_set_spte()
/arch/alpha/lib/
Dev67-strchr.S59 cttz t0, a2 # U0 : speculative (in case we get a match)
76 cttz t3, a2 # U0 : speculative (in case we get a match)
Dev6-memset.S166 addq $5, 128, $4 # E : speculative target of next wh64
344 addq $5, 128, $4 # E : speculative target of next wh64
532 addq $5, 128, $4 # E : speculative target of next wh64
/arch/sh/
DKconfig.cpu69 This enables support for a speculative instruction fetch for
/arch/s390/kernel/
Dentry.S277 xgr %r1,%r1 # prevent speculative use
315 # clear user controlled register to prevent speculative use
/arch/s390/
DKconfig564 regard to speculative execution.
576 prompt "Avoid speculative indirect branches in the kernel"
579 against kernel-to-user data leaks by avoiding speculative indirect
/arch/arm/mm/
DKconfig935 not perform speculative loads into the D-cache. For such
1108 on ARMv6 CPUs, but since they do not have aggressive speculative
/arch/x86/
DKconfig2398 bool "Mitigations for speculative execution vulnerabilities"
2402 speculative execution hardware vulnerabilities.
2421 bool "Avoid speculative indirect branches in kernel"
2425 kernel-to-user data leaks by avoiding speculative indirect
2463 bool "Mitigate speculative RAS overflow on AMD"
2484 unprivileged speculative access to data which was previously stored in
/arch/arm/
DKconfig930 r3p*) erratum. A speculative memory access may cause a page table walk
/arch/arm64/
DKconfig711 to prevent a speculative PAR_EL1 read.