diff options
author | 2024-11-29 15:47:49 +0100 | |
---|---|---|
committer | 2024-12-13 09:28:21 +0100 | |
commit | dda014ba59331dee4f3b773a020e109932f4bd24 (patch) | |
tree | 36706823f8ff905afc600701913807230b3efce3 /tools/perf/scripts/python/export-to-postgresql.py | |
parent | x86: make get_cpu_vendor() accessible from Xen code (diff) | |
download | wireguard-linux-dda014ba59331dee4f3b773a020e109932f4bd24.tar.xz wireguard-linux-dda014ba59331dee4f3b773a020e109932f4bd24.zip |
objtool/x86: allow syscall instruction
The syscall instruction is used in Xen PV mode for doing hypercalls.
Allow syscall to be used in the kernel in case it is tagged with an
unwind hint for objtool.
This is part of XSA-466 / CVE-2024-53241.
Reported-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
Co-developed-by: Peter Zijlstra <peterz@infradead.org>
Diffstat (limited to 'tools/perf/scripts/python/export-to-postgresql.py')
0 files changed, 0 insertions, 0 deletions