x86/xen: Fix initialisation in hypercall_page after rethunk
authorBen Hutchings <ben@decadent.org.uk>
Wed, 13 Jul 2022 22:39:33 +0000 (00:39 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 23 Jul 2022 10:54:11 +0000 (12:54 +0200)
commit96907c5d3927515029ad1f38a31d56dc04b8d288
tree5e0a0c7663a16844219e8285ce713893c81091fd
parent86ccf19a91beed4c1d1a2c9dc9c7af1f991a7fea
x86/xen: Fix initialisation in hypercall_page after rethunk

The hypercall_page is special and the RETs there should not be changed
into rethunk calls (but can have SLS mitigation).  Change the initial
instructions to ret + int3 padding, as was done in upstream commit
5b2fc51576ef "x86/ibt,xen: Sprinkle the ENDBR".

Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/xen/xen-head.S