diff options
author | Juergen Gross <[email protected]> | 2024-10-17 14:47:13 +0200 |
---|---|---|
committer | Juergen Gross <[email protected]> | 2024-12-17 08:23:41 +0100 |
commit | b1c2cb86f4a7861480ad54bb9a58df3cbebf8e92 (patch) | |
tree | 1ca0571409bc62b7d132ac505cbaaca78b223c5f /tools/testing/selftests/bpf/prog_tests/prog_array_init.c | |
parent | b4845bb6383821a9516ce30af3a27dc873e37fd4 (diff) |
x86/xen: use new hypercall functions instead of hypercall page
Call the Xen hypervisor via the new xen_hypercall_func static-call
instead of the hypercall page.
This is part of XSA-466 / CVE-2024-53241.
Reported-by: Andrew Cooper <[email protected]>
Signed-off-by: Juergen Gross <[email protected]>
Co-developed-by: Peter Zijlstra <[email protected]>
Co-developed-by: Josh Poimboeuf <[email protected]>
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests/prog_array_init.c')
0 files changed, 0 insertions, 0 deletions