From a4b4d3d5a89c61baab042a8972676b6b4f30a9a4 Mon Sep 17 00:00:00 2001 From: Jan Beulich Date: Mon, 22 Feb 2016 17:23:08 +0100 Subject: [PATCH] x86: drop register reload from INT80 malicious MSI guard None of the restored registers are actually of interest to the subsequent code (as opposed to the similar construct on the compat mode hypercall path). Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper --- xen/arch/x86/x86_64/entry.S | 1 - 1 file changed, 1 deletion(-) diff --git a/xen/arch/x86/x86_64/entry.S b/xen/arch/x86/x86_64/entry.S index e0f5c83ac7..dd7f1149d7 100644 --- a/xen/arch/x86/x86_64/entry.S +++ b/xen/arch/x86/x86_64/entry.S @@ -286,7 +286,6 @@ ENTRY(int80_direct_trap) UNLIKELY_START(ne, msi_check) movl $0x80,%edi call check_for_unexpected_msi - LOAD_C_CLOBBERED UNLIKELY_END(msi_check) GET_CURRENT(%rbx) -- 2.30.2