aboutsummaryrefslogtreecommitdiffstats
path: root/arch/x86/include/asm/xen/hypercall.h
diff options
context:
space:
mode:
authorJuergen Gross <[email protected]>2024-11-29 14:47:49 +0000
committerJuergen Gross <[email protected]>2024-12-13 08:28:21 +0000
commitdda014ba59331dee4f3b773a020e109932f4bd24 (patch)
tree36706823f8ff905afc600701913807230b3efce3 /arch/x86/include/asm/xen/hypercall.h
parentx86: make get_cpu_vendor() accessible from Xen code (diff)
downloadkernel-dda014ba59331dee4f3b773a020e109932f4bd24.tar.gz
kernel-dda014ba59331dee4f3b773a020e109932f4bd24.zip
objtool/x86: allow syscall instruction
The syscall instruction is used in Xen PV mode for doing hypercalls. Allow syscall to be used in the kernel in case it is tagged with an unwind hint for objtool. This is part of XSA-466 / CVE-2024-53241. Reported-by: Andrew Cooper <[email protected]> Signed-off-by: Juergen Gross <[email protected]> Co-developed-by: Peter Zijlstra <[email protected]>
Diffstat (limited to 'arch/x86/include/asm/xen/hypercall.h')
0 files changed, 0 insertions, 0 deletions