summaryrefslogtreecommitdiff
path: root/scripts/generate_rust_analyzer.py
diff options
context:
space:
mode:
authorJuergen Gross <jgross@suse.com>2024-10-17 16:27:31 +0300
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-12-19 20:13:24 +0300
commitf6e1c44d731a9fcfc36f351f6896960940aa69da (patch)
tree7da57398f11b147cc1d77d6b5fc28420557c65ba /scripts/generate_rust_analyzer.py
parent42d50bb38a691ea8ac459b4f966f7e66f939c147 (diff)
downloadlinux-f6e1c44d731a9fcfc36f351f6896960940aa69da.tar.xz
x86/xen: remove hypercall page
commit 7fa0da5373685e7ed249af3fa317ab1e1ba8b0a6 upstream. The hypercall page is no longer needed. It can be removed, as from the Xen perspective it is optional. But, from Linux's perspective, it removes naked RET instructions that escape the speculative protections that Call Depth Tracking and/or Untrain Ret are trying to achieve. This is part of XSA-466 / CVE-2024-53241. Reported-by: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Juergen Gross <jgross@suse.com> Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com> Reviewed-by: Jan Beulich <jbeulich@suse.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'scripts/generate_rust_analyzer.py')
0 files changed, 0 insertions, 0 deletions