aboutsummaryrefslogtreecommitdiffstats
path: root/tools/perf/scripts/python/syscall-counts-by-pid.py
diff options
context:
space:
mode:
authorJosh Poimboeuf <[email protected]>2019-07-15 16:51:39 +0000
committerThomas Gleixner <[email protected]>2019-07-17 13:37:14 +0000
commit64dbc122b20f75183d8822618c24f85144a5a94d (patch)
tree49399e44a25bed365000cf7ae9af240db1065350 /tools/perf/scripts/python/syscall-counts-by-pid.py
parentx86/speculation: Enable Spectre v1 swapgs mitigations (diff)
downloadkernel-64dbc122b20f75183d8822618c24f85144a5a94d.tar.gz
kernel-64dbc122b20f75183d8822618c24f85144a5a94d.zip
x86/entry/64: Use JMP instead of JMPQ
Somehow the swapgs mitigation entry code patch ended up with a JMPQ instruction instead of JMP, where only the short jump is needed. Some assembler versions apparently fail to optimize JMPQ into a two-byte JMP when possible, instead always using a 7-byte JMP with relocation. For some reason that makes the entry code explode with a #GP during boot. Change it back to "JMP" as originally intended. Fixes: 18ec54fdd6d1 ("x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations") Signed-off-by: Josh Poimboeuf <[email protected]> Signed-off-by: Thomas Gleixner <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts-by-pid.py')
0 files changed, 0 insertions, 0 deletions