This is part of implementing a technique to mitigate against Spectre v1,
similar in spirit to what has been proposed by Chandler for X86_64 at
http://lists.llvm.org/pipermail/llvm-dev/2018-March/122085.html.
This patch implements a specific policy for automatically mitigating
against Spectre v1 attacks. The policy implemented in this patch
protects all integer data that is loaded from being used in
miss-speculaled path executions. Presumably, a number of different
policies could be better in different situations (e.g. not
automatically protecting data loaded from the stack). Therefore, I see
this patch as one example of a policy to automatically mitigate
against Spectre v1.