We care simply that the vulnerability is fixed, rather than the architectural
correctness of the emulation of `invlpg`. Correctness should be implemented
by a functional test.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
{
printk("XSA-168 PoC\n");
- asm volatile ("invlpg (%0)" :: "q" (0x8000000000000000UL));
+ /**
+ * At the time of writing, Xen doesn't correctly handle `invlpg` while
+ * running in shadow mode on AMD Gen1 hardware lacking decode assistance.
+ * For this test, we simply care that Xen doesn't crash.
+ *
+ * @todo Write a different test which cares about the architecturally
+ * correct handling of `invlpg`.
+ */
+ asm volatile ("1: invlpg (%0); 2:"
+ _ASM_EXTABLE(1b, 2b)
+ :: "q" (0x8000000000000000UL));
xtf_success(NULL);
}