]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
objtool/x86: allow syscall instruction
authorJuergen Gross <jgross@suse.com>
Fri, 29 Nov 2024 14:47:49 +0000 (15:47 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 19 Dec 2024 17:07:22 +0000 (18:07 +0100)
commit1c50e8da50b07c69385d601dd0443f5bbe71d933
tree37f1632007ef8c116ded8fb82fc6231adde37810
parent8f2c179b1d3ce0a0c5d623fc9991d71167fd076f
objtool/x86: allow syscall instruction

commit dda014ba59331dee4f3b773a020e109932f4bd24 upstream.

The syscall instruction is used in Xen PV mode for doing hypercalls.
Allow syscall to be used in the kernel in case it is tagged with an
unwind hint for objtool.

This is part of XSA-466 / CVE-2024-53241.

Reported-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
Co-developed-by: Peter Zijlstra <peterz@infradead.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
tools/objtool/check.c