Home
last modified time | relevance | path

Searched refs:swapgs (Results 1 – 11 of 11) sorted by relevance

/Linux-v5.10/arch/x86/include/asm/
Dirqflags.h134 #define SWAPGS swapgs
144 #define SWAPGS_UNSAFE_STACK swapgs
148 swapgs; \
151 swapgs; \
Dparavirt_types.h172 void (*swapgs)(void); member
Dparavirt.h785 PARA_SITE(PARA_PATCH(PV_CPU_swapgs), swapgs)
/Linux-v5.10/arch/x86/entry/
Dentry_64.S52 swapgs
98 swapgs
732 swapgs
736 swapgs
746 swapgs /* switch back to user gs */
1168 swapgs
Dentry_64_compat.S202 swapgs
309 swapgs
/Linux-v5.10/Documentation/admin-guide/hw-vuln/
Dspectre.rst47 CVE-2019-1125 Spectre v1 swapgs Spectre variant 1 (swapgs)
85 handlers all have conditional swapgs checks. Those may be problematic
158 Spectre variant 1 (swapgs)
162 swapgs path for an interrupt or exception. If they initialize
163 the GS register to a user-space value, if the swapgs is speculatively
173 swapgs
178 swapgs, and then do a speculative percpu load using the user GS
185 speculatively do the swapgs, causing the user GS to get used for the
331 * - 'Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers'
332 - The swapgs protections are disabled; otherwise it has
[all …]
/Linux-v5.10/arch/x86/kernel/
Dasm-offsets_64.c18 OFFSET(PV_CPU_swapgs, paravirt_patch_template, cpu.swapgs); in main()
Dparavirt_patch.c89 PATCH_CASE(cpu, swapgs, xxl, insn_buff, len); in native_patch()
Dparavirt.c315 .cpu.swapgs = native_swapgs,
/Linux-v5.10/Documentation/x86/
Dentry_64.rst53 Dealing with the swapgs instruction is especially tricky. Swapgs
54 toggles whether gs is the kernel gs or the user gs. The swapgs
/Linux-v5.10/arch/x86/xen/
Denlighten_pv.c1069 .swapgs = paravirt_nop,