aboutsummaryrefslogtreecommitdiff
path: root/arch/x86/xen/enlighten_hvm.c
diff options
context:
space:
mode:
authorJuergen Gross <[email protected]>2024-10-16 10:40:26 +0200
committerJuergen Gross <[email protected]>2024-12-13 09:28:43 +0100
commita2796dff62d6c6bfc5fbebdf2bee0d5ac0438906 (patch)
tree65ea0b02325283da4035014b83c5c7ff41816c72 /arch/x86/xen/enlighten_hvm.c
parent0ef8047b737d7480a5d4c46d956e97c190f13050 (diff)
x86/xen: don't do PV iret hypercall through hypercall page
Instead of jumping to the Xen hypercall page for doing the iret hypercall, directly code the required sequence in xen-asm.S. This is done in preparation of no longer using hypercall page at all, as it has shown to cause problems with speculation mitigations. This is part of XSA-466 / CVE-2024-53241. Reported-by: Andrew Cooper <[email protected]> Signed-off-by: Juergen Gross <[email protected]> Reviewed-by: Jan Beulich <[email protected]>
Diffstat (limited to 'arch/x86/xen/enlighten_hvm.c')
0 files changed, 0 insertions, 0 deletions