aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/scripts/generate_rust_analyzer.py
diff options
context:
space:
mode:
authorJuergen Gross <jgross@suse.com>2024-10-16 10:40:26 +0200
committerJuergen Gross <jgross@suse.com>2024-12-13 09:28:43 +0100
commita2796dff62d6c6bfc5fbebdf2bee0d5ac0438906 (patch)
tree65ea0b02325283da4035014b83c5c7ff41816c72 /scripts/generate_rust_analyzer.py
parentx86/static-call: provide a way to do very early static-call updates (diff)
downloadwireguard-linux-a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906.tar.xz
wireguard-linux-a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906.zip
x86/xen: don't do PV iret hypercall through hypercall page
Instead of jumping to the Xen hypercall page for doing the iret hypercall, directly code the required sequence in xen-asm.S. This is done in preparation of no longer using hypercall page at all, as it has shown to cause problems with speculation mitigations. This is part of XSA-466 / CVE-2024-53241. Reported-by: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Juergen Gross <jgross@suse.com> Reviewed-by: Jan Beulich <jbeulich@suse.com>
Diffstat (limited to 'scripts/generate_rust_analyzer.py')
0 files changed, 0 insertions, 0 deletions