Searched refs:swapgs (Results 1 – 11 of 11) sorted by relevance
| /Linux-v5.10/arch/x86/include/asm/ |
| D | irqflags.h | 134 #define SWAPGS swapgs 144 #define SWAPGS_UNSAFE_STACK swapgs 148 swapgs; \ 151 swapgs; \
|
| D | paravirt_types.h | 172 void (*swapgs)(void); member
|
| D | paravirt.h | 785 PARA_SITE(PARA_PATCH(PV_CPU_swapgs), swapgs)
|
| /Linux-v5.10/arch/x86/entry/ |
| D | entry_64.S | 52 swapgs 98 swapgs 732 swapgs 736 swapgs 746 swapgs /* switch back to user gs */ 1168 swapgs
|
| D | entry_64_compat.S | 202 swapgs 309 swapgs
|
| /Linux-v5.10/Documentation/admin-guide/hw-vuln/ |
| D | spectre.rst | 47 CVE-2019-1125 Spectre v1 swapgs Spectre variant 1 (swapgs) 85 handlers all have conditional swapgs checks. Those may be problematic 158 Spectre variant 1 (swapgs) 162 swapgs path for an interrupt or exception. If they initialize 163 the GS register to a user-space value, if the swapgs is speculatively 173 swapgs 178 swapgs, and then do a speculative percpu load using the user GS 185 speculatively do the swapgs, causing the user GS to get used for the 331 * - 'Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers' 332 - The swapgs protections are disabled; otherwise it has [all …]
|
| /Linux-v5.10/arch/x86/kernel/ |
| D | asm-offsets_64.c | 18 OFFSET(PV_CPU_swapgs, paravirt_patch_template, cpu.swapgs); in main()
|
| D | paravirt_patch.c | 89 PATCH_CASE(cpu, swapgs, xxl, insn_buff, len); in native_patch()
|
| D | paravirt.c | 315 .cpu.swapgs = native_swapgs,
|
| /Linux-v5.10/Documentation/x86/ |
| D | entry_64.rst | 53 Dealing with the swapgs instruction is especially tricky. Swapgs 54 toggles whether gs is the kernel gs or the user gs. The swapgs
|
| /Linux-v5.10/arch/x86/xen/ |
| D | enlighten_pv.c | 1069 .swapgs = paravirt_nop,
|