]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
x86/xen: don't do PV iret hypercall through hypercall page
authorJuergen Gross <jgross@suse.com>
Wed, 16 Oct 2024 08:40:26 +0000 (10:40 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 19 Dec 2024 17:13:23 +0000 (18:13 +0100)
commitf7c3fdad0a474062d566aae3289d490d7e702d30
tree0a64c3df1c38d4b2ff1ce3323191156d68304267
parentfa0f23a60ea5c20e9e41bd2cf8bc049017c4f305
x86/xen: don't do PV iret hypercall through hypercall page

commit a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906 upstream.

Instead of jumping to the Xen hypercall page for doing the iret
hypercall, directly code the required sequence in xen-asm.S.

This is done in preparation of no longer using hypercall page at all,
as it has shown to cause problems with speculation mitigations.

This is part of XSA-466 / CVE-2024-53241.

Reported-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/xen/xen-asm.S