linux/arch/x86/include/asm/xen
Juergen Gross 7fa0da5373 x86/xen: remove hypercall page
The hypercall page is no longer needed. It can be removed, as from the
Xen perspective it is optional.

But, from Linux's perspective, it removes naked RET instructions that
escape the speculative protections that Call Depth Tracking and/or
Untrain Ret are trying to achieve.

This is part of XSA-466 / CVE-2024-53241.

Reported-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
2024-12-17 08:23:42 +01:00
..
cpuid.h xen: update arch/x86/include/asm/xen/cpuid.h 2023-02-23 08:18:59 +01:00
events.h x86/xen: Add support for HVMOP_set_evtchn_upcall_vector 2022-08-12 11:28:21 +02:00
hypercall.h x86/xen: remove hypercall page 2024-12-17 08:23:42 +01:00
hypervisor.h x86/xen: fix memblock_reserve() usage on PVH 2024-07-25 13:11:08 +02:00
interface.h
interface_32.h
interface_64.h arch/x86: Fix typos 2024-01-03 11:46:22 +01:00
page.h x86/xen: Make virt_to_pfn() a static inline 2023-08-21 09:52:29 +02:00
pci.h
swiotlb-xen.h x86: always initialize xen-swiotlb when xen-pcifront is enabling 2023-07-31 17:54:27 +02:00
trace_types.h