]> www.infradead.org Git - users/dwmw2/linux.git/commit
x86/xen: remove hypercall page
authorJuergen Gross <jgross@suse.com>
Thu, 17 Oct 2024 13:27:31 +0000 (15:27 +0200)
committerJuergen Gross <jgross@suse.com>
Tue, 17 Dec 2024 07:23:42 +0000 (08:23 +0100)
commit7fa0da5373685e7ed249af3fa317ab1e1ba8b0a6
treefd857217441f169e495b8f32663340f0341ff134
parentb1c2cb86f4a7861480ad54bb9a58df3cbebf8e92
x86/xen: remove hypercall page

The hypercall page is no longer needed. It can be removed, as from the
Xen perspective it is optional.

But, from Linux's perspective, it removes naked RET instructions that
escape the speculative protections that Call Depth Tracking and/or
Untrain Ret are trying to achieve.

This is part of XSA-466 / CVE-2024-53241.

Reported-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
arch/x86/include/asm/xen/hypercall.h
arch/x86/kernel/callthunks.c
arch/x86/kernel/vmlinux.lds.S
arch/x86/xen/enlighten.c
arch/x86/xen/enlighten_hvm.c
arch/x86/xen/enlighten_pvh.c
arch/x86/xen/xen-head.S