Home
last modified time | relevance | path

Searched refs:swapgs (Results 1 – 3 of 3) sorted by relevance

/linux/arch/x86/entry/
H A Dentry_64_compat.S54 swapgs
187 swapgs
279 swapgs
/linux/Documentation/admin-guide/hw-vuln/
H A Dspectre.rst47 CVE-2019-1125 Spectre v1 swapgs Spectre variant 1 (swapgs)
85 handlers all have conditional swapgs checks. Those may be problematic
170 Spectre variant 1 (swapgs)
174 swapgs path for an interrupt or exception. If they initialize
175 the GS register to a user-space value, if the swapgs is speculatively
185 swapgs
190 swapgs, and then do a speculative percpu load using the user GS
197 speculatively do the swapgs, causing the user GS to get used for the
343 * - 'Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barrier
[all...]
/linux/Documentation/arch/x86/
H A Dentry_64.rst53 Dealing with the swapgs instruction is especially tricky. Swapgs
54 toggles whether gs is the kernel gs or the user gs. The swapgs