sst-linux/tools/objtool
Juergen Gross 054f07a204 objtool/x86: allow syscall instruction
commit dda014ba59331dee4f3b773a020e109932f4bd24 upstream.

The syscall instruction is used in Xen PV mode for doing hypercalls.
Allow syscall to be used in the kernel in case it is tagged with an
unwind hint for objtool.

This is part of XSA-466 / CVE-2024-53241.

Reported-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
Co-developed-by: Peter Zijlstra <peterz@infradead.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-12-19 18:08:58 +01:00
..
arch/x86 objtool/x86: Fix SRSO mess 2023-08-27 21:01:31 +02:00
Documentation
include/objtool objtool/x86: Fix SRSO mess 2023-08-27 21:01:31 +02:00
.gitignore
Build
builtin-check.c
check.c objtool/x86: allow syscall instruction 2024-12-19 18:08:58 +01:00
elf.c
Makefile
objtool.c objtool: Propagate early errors 2023-11-20 11:51:50 +01:00
orc_dump.c
orc_gen.c
special.c
sync-check.sh
weak.c