Home
last modified time | relevance | path

Searched refs:swapgs (Results 1 – 11 of 11) sorted by relevance

/Linux-v5.4/arch/x86/include/asm/
Dirqflags.h134 #define SWAPGS swapgs
144 #define SWAPGS_UNSAFE_STACK swapgs
148 swapgs; \
151 swapgs; \
Dparavirt_types.h176 void (*swapgs)(void); member
Dparavirt.h888 PARA_SITE(PARA_PATCH(PV_CPU_swapgs), swapgs)
/Linux-v5.4/arch/x86/entry/
Dentry_64_compat.S201 swapgs
312 swapgs
Dentry_64.S51 swapgs
153 swapgs
1446 swapgs
/Linux-v5.4/Documentation/admin-guide/hw-vuln/
Dspectre.rst47 CVE-2019-1125 Spectre v1 swapgs Spectre variant 1 (swapgs)
85 handlers all have conditional swapgs checks. Those may be problematic
158 Spectre variant 1 (swapgs)
162 swapgs path for an interrupt or exception. If they initialize
163 the GS register to a user-space value, if the swapgs is speculatively
173 swapgs
178 swapgs, and then do a speculative percpu load using the user GS
185 speculatively do the swapgs, causing the user GS to get used for the
331 * - 'Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers'
332 - The swapgs protections are disabled; otherwise it has
[all …]
/Linux-v5.4/arch/x86/kernel/
Dasm-offsets_64.c42 OFFSET(PV_CPU_swapgs, paravirt_patch_template, cpu.swapgs); in main()
Dparavirt_patch.c103 PATCH_CASE(cpu, swapgs, xxl, insn_buff, len); in native_patch()
Dparavirt.c342 .cpu.swapgs = native_swapgs,
/Linux-v5.4/Documentation/x86/
Dentry_64.rst53 Dealing with the swapgs instruction is especially tricky. Swapgs
54 toggles whether gs is the kernel gs or the user gs. The swapgs
/Linux-v5.4/arch/x86/xen/
Denlighten_pv.c1062 .swapgs = paravirt_nop,