]> xenbits.xensource.com Git - people/andrewcoop/xen-test-framework.git/commit
XSA-296: Don't rely on PV-L1TF side effects
authorAndrew Cooper <andrew.cooper3@citrix.com>
Tue, 9 Jan 2024 20:51:18 +0000 (20:51 +0000)
committerAndrew Cooper <andrew.cooper3@citrix.com>
Wed, 10 Jan 2024 14:00:53 +0000 (14:00 +0000)
commitf3bd152f5e83da943535f6ba7b5772d4dbe96717
tree2cffeadc0bb018c59345b1ec9cb9fc91670d294d
parent0bcd7fcbd88678c16fa651b07e2049f84fae7e44
XSA-296: Don't rely on PV-L1TF side effects

When CONFIG_SHADOW_PAGING is compiled out, PV-L1TF defaults to domain_crash()
on vulnerable hardware.  While this has technically demonstrated that Xen
isn't vulnerable to XSA-296, it's an unclean exit.

The pv64 case can already spot and correct the race condition, while the
pv32pae test is no different to running on non-L1TF vulnerable hardware
already.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
tests/xsa-296/main.c