diff options
| author | Juergen Gross <[email protected]> | 2024-10-17 13:27:31 +0000 |
|---|---|---|
| committer | Juergen Gross <[email protected]> | 2024-12-17 07:23:42 +0000 |
| commit | 7fa0da5373685e7ed249af3fa317ab1e1ba8b0a6 (patch) | |
| tree | fd857217441f169e495b8f32663340f0341ff134 /arch/x86/include/asm/xen/hypercall.h | |
| parent | x86/xen: use new hypercall functions instead of hypercall page (diff) | |
| download | kernel-7fa0da5373685e7ed249af3fa317ab1e1ba8b0a6.tar.gz kernel-7fa0da5373685e7ed249af3fa317ab1e1ba8b0a6.zip | |
x86/xen: remove hypercall page
The hypercall page is no longer needed. It can be removed, as from the
Xen perspective it is optional.
But, from Linux's perspective, it removes naked RET instructions that
escape the speculative protections that Call Depth Tracking and/or
Untrain Ret are trying to achieve.
This is part of XSA-466 / CVE-2024-53241.
Reported-by: Andrew Cooper <[email protected]>
Signed-off-by: Juergen Gross <[email protected]>
Reviewed-by: Andrew Cooper <[email protected]>
Reviewed-by: Jan Beulich <[email protected]>
Diffstat (limited to 'arch/x86/include/asm/xen/hypercall.h')
| -rw-r--r-- | arch/x86/include/asm/xen/hypercall.h | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/arch/x86/include/asm/xen/hypercall.h b/arch/x86/include/asm/xen/hypercall.h index 7d5f8ad66774..97771b9d33af 100644 --- a/arch/x86/include/asm/xen/hypercall.h +++ b/arch/x86/include/asm/xen/hypercall.h @@ -88,8 +88,6 @@ struct xen_dm_op_buf; * there aren't more than 5 arguments...) */ -extern struct { char _entry[32]; } hypercall_page[]; - void xen_hypercall_func(void); DECLARE_STATIC_CALL(xen_hypercall, xen_hypercall_func); |
