diff options
| author | Juergen Gross <jgross@suse.com> | 2024-10-16 11:40:26 +0300 |
|---|---|---|
| committer | Juergen Gross <jgross@suse.com> | 2024-12-13 11:28:43 +0300 |
| commit | a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906 (patch) | |
| tree | 65ea0b02325283da4035014b83c5c7ff41816c72 /scripts/gdb/linux/proc.py | |
| parent | 0ef8047b737d7480a5d4c46d956e97c190f13050 (diff) | |
| download | linux-a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906.tar.xz | |
x86/xen: don't do PV iret hypercall through hypercall page
Instead of jumping to the Xen hypercall page for doing the iret
hypercall, directly code the required sequence in xen-asm.S.
This is done in preparation of no longer using hypercall page at all,
as it has shown to cause problems with speculation mitigations.
This is part of XSA-466 / CVE-2024-53241.
Reported-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Diffstat (limited to 'scripts/gdb/linux/proc.py')
0 files changed, 0 insertions, 0 deletions
