diff options
| author | Josh Poimboeuf <[email protected]> | 2019-07-15 16:51:39 +0000 |
|---|---|---|
| committer | Thomas Gleixner <[email protected]> | 2019-07-17 13:37:14 +0000 |
| commit | 64dbc122b20f75183d8822618c24f85144a5a94d (patch) | |
| tree | 49399e44a25bed365000cf7ae9af240db1065350 /tools/perf/scripts/python/syscall-counts-by-pid.py | |
| parent | x86/speculation: Enable Spectre v1 swapgs mitigations (diff) | |
| download | kernel-64dbc122b20f75183d8822618c24f85144a5a94d.tar.gz kernel-64dbc122b20f75183d8822618c24f85144a5a94d.zip | |
x86/entry/64: Use JMP instead of JMPQ
Somehow the swapgs mitigation entry code patch ended up with a JMPQ
instruction instead of JMP, where only the short jump is needed. Some
assembler versions apparently fail to optimize JMPQ into a two-byte JMP
when possible, instead always using a 7-byte JMP with relocation. For
some reason that makes the entry code explode with a #GP during boot.
Change it back to "JMP" as originally intended.
Fixes: 18ec54fdd6d1 ("x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations")
Signed-off-by: Josh Poimboeuf <[email protected]>
Signed-off-by: Thomas Gleixner <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts-by-pid.py')
0 files changed, 0 insertions, 0 deletions
