]> www.infradead.org Git - users/jedix/linux-maple.git/commit
x86/xen: don't do PV iret hypercall through hypercall page
authorJuergen Gross <jgross@suse.com>
Wed, 16 Oct 2024 08:40:26 +0000 (10:40 +0200)
committerJuergen Gross <jgross@suse.com>
Fri, 13 Dec 2024 08:28:43 +0000 (09:28 +0100)
commita2796dff62d6c6bfc5fbebdf2bee0d5ac0438906
tree65ea0b02325283da4035014b83c5c7ff41816c72
parent0ef8047b737d7480a5d4c46d956e97c190f13050
x86/xen: don't do PV iret hypercall through hypercall page

Instead of jumping to the Xen hypercall page for doing the iret
hypercall, directly code the required sequence in xen-asm.S.

This is done in preparation of no longer using hypercall page at all,
as it has shown to cause problems with speculation mitigations.

This is part of XSA-466 / CVE-2024-53241.

Reported-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
arch/x86/xen/xen-asm.S