]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
x86/xen: don't do PV iret hypercall through hypercall page
authorJuergen Gross <jgross@suse.com>
Wed, 16 Oct 2024 08:40:26 +0000 (10:40 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 19 Dec 2024 17:08:58 +0000 (18:08 +0100)
commitfa719857f613fed94a79da055b13ca51214c694f
tree721c78b3d9b6c4322a543b50edb14b2bf38d9331
parentf8b1f5472b19e29439d58dc52cfb67cfeac18770
x86/xen: don't do PV iret hypercall through hypercall page

commit a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906 upstream.

Instead of jumping to the Xen hypercall page for doing the iret
hypercall, directly code the required sequence in xen-asm.S.

This is done in preparation of no longer using hypercall page at all,
as it has shown to cause problems with speculation mitigations.

This is part of XSA-466 / CVE-2024-53241.

Reported-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/xen/xen-asm.S