Revert "x86/PV32: avoid TLB flushing after mod_l3_entry()" and "x86/PV: restrict...
authorAndrew Cooper <andrew.cooper3@citrix.com>
Thu, 13 May 2021 15:43:27 +0000 (16:43 +0100)
committerAndrew Cooper <andrew.cooper3@citrix.com>
Thu, 13 May 2021 17:15:00 +0000 (18:15 +0100)
commitcb199cc7de987cfda4659fccf51059f210f6ad34
treec0456f57122965530f69d3273ed4a5f181b6ac4a
parent43d4cc7d36503bcc3aa2aa6ebea2b7912808f254
Revert "x86/PV32: avoid TLB flushing after mod_l3_entry()" and "x86/PV: restrict TLB flushing after mod_l[234]_entry()"

These reintroduce XSA-286 / CVE-2018-15469, as confirmed by the xsa-286 XTF
test run by OSSTest.

The TLB flushing is for Xen's correctness, not the guest's.

The text in c/s bed7e6cad30 is technically correct, from the guests point of
view, but clearly false as far as XSA-286 is concerned.  That said, it is
edcfce55917 which introduced the regression, which demonstrates that the
reasoning is flawed.

This reverts commit bed7e6cad30ec8db0c9ce9a1676856e9dc4c39da.
This reverts commit edcfce55917bb412f986d7b28358f6ef155b3664.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
xen/arch/x86/mm.c