Home | History | Annotate | Download | only in X86

Lines Matching refs:LFENCE

76 STATISTIC(NumLFENCEsInserted, "Number of lfence instructions inserted");
79 PASS_KEY "-lfence",
81 "Use LFENCE along each conditional edge to harden against speculative "
376 // Loads within this basic block after an LFENCE are not at risk of
379 if (MI.getOpcode() == X86::LFENCE)
450 // We need to insert an LFENCE at the start of the function to suspend any
456 BuildMI(Entry, EntryInsertPt, Loc, TII->get(X86::LFENCE));
461 // If we guarded the entry with an LFENCE and have no conditionals to protect
550 /// Implements the naive hardening approach of putting an LFENCE after every
582 BuildMI(*MBB, InsertPt, DebugLoc(), TII->get(X86::LFENCE));
1361 /// address. We also skip hardening loads already behind an LFENCE as that is
1387 // hardened loads and also look for LFENCE to stop hardening wherever
1413 // LFENCE to be a speculation barrier, so if we see an LFENCE, there is
1415 if (MI.getOpcode() == X86::LFENCE)
2093 /// We can harden this by introducing an LFENCE that will delay any load of the
2098 /// If we are not using an LFENCE, hardening the stack pointer has an additional
2114 // an LFENCE. This is potentially a heavy-weight mitigation strategy, but
2122 BuildMI(MBB, InsertPt, Loc, TII->get(X86::LFENCE));