From: Peter Zijlstra Date: Wed, 24 Sep 2025 13:22:46 +0000 (+0200) Subject: objtool/x86: Remove 0xea hack X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=c5df4e1ab8c00c4dc13094fa44e219bc48d910f4;p=thirdparty%2Fkernel%2Flinux.git objtool/x86: Remove 0xea hack Was properly fixed in the decoder with commit 4b626015e1bf ("x86/insn: Stop decoding i64 instructions in x86-64 mode at opcode") Signed-off-by: Peter Zijlstra (Intel) Reviewed-by: Alexandre Chartre --- diff --git a/tools/objtool/arch/x86/decode.c b/tools/objtool/arch/x86/decode.c index 0ad5cc70ecbe7..ce16fb2bd7e93 100644 --- a/tools/objtool/arch/x86/decode.c +++ b/tools/objtool/arch/x86/decode.c @@ -189,15 +189,6 @@ int arch_decode_instruction(struct objtool_file *file, const struct section *sec op2 = ins.opcode.bytes[1]; op3 = ins.opcode.bytes[2]; - /* - * XXX hack, decoder is buggered and thinks 0xea is 7 bytes long. - */ - if (op1 == 0xea) { - insn->len = 1; - insn->type = INSN_BUG; - return 0; - } - if (ins.rex_prefix.nbytes) { rex = ins.rex_prefix.bytes[0]; rex_w = X86_REX_W(rex) >> 3;