Searched refs:swapgs (Results 1 – 3 of 3) sorted by relevance
54 swapgs187 swapgs279 swapgs
47 CVE-2019-1125 Spectre v1 swapgs Spectre variant 1 (swapgs)85 handlers all have conditional swapgs checks. Those may be problematic170 Spectre variant 1 (swapgs)174 swapgs path for an interrupt or exception. If they initialize175 the GS register to a user-space value, if the swapgs is speculatively185 swapgs190 swapgs, and then do a speculative percpu load using the user GS197 speculatively do the swapgs, causing the user GS to get used for the343 * - 'Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barrier[all...]
53 Dealing with the swapgs instruction is especially tricky. Swapgs54 toggles whether gs is the kernel gs or the user gs. The swapgs