diff options
author | 2024-10-16 10:40:26 +0200 | |
---|---|---|
committer | 2024-12-13 09:28:43 +0100 | |
commit | a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906 (patch) | |
tree | 65ea0b02325283da4035014b83c5c7ff41816c72 /scripts/generate_rust_analyzer.py | |
parent | x86/static-call: provide a way to do very early static-call updates (diff) | |
download | wireguard-linux-a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906.tar.xz wireguard-linux-a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906.zip |
x86/xen: don't do PV iret hypercall through hypercall page
Instead of jumping to the Xen hypercall page for doing the iret
hypercall, directly code the required sequence in xen-asm.S.
This is done in preparation of no longer using hypercall page at all,
as it has shown to cause problems with speculation mitigations.
This is part of XSA-466 / CVE-2024-53241.
Reported-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Diffstat (limited to 'scripts/generate_rust_analyzer.py')
0 files changed, 0 insertions, 0 deletions