aboutsummaryrefslogtreecommitdiff
path: root/tools/testing/selftests/bpf/prog_tests/prog_array_init.c
diff options
context:
space:
mode:
authorJuergen Gross <[email protected]>2024-11-29 15:47:49 +0100
committerJuergen Gross <[email protected]>2024-12-13 09:28:21 +0100
commitdda014ba59331dee4f3b773a020e109932f4bd24 (patch)
tree36706823f8ff905afc600701913807230b3efce3 /tools/testing/selftests/bpf/prog_tests/prog_array_init.c
parentefbcd61d9bebb771c836a3b8bfced8165633db7c (diff)
objtool/x86: allow syscall instruction
The syscall instruction is used in Xen PV mode for doing hypercalls. Allow syscall to be used in the kernel in case it is tagged with an unwind hint for objtool. This is part of XSA-466 / CVE-2024-53241. Reported-by: Andrew Cooper <[email protected]> Signed-off-by: Juergen Gross <[email protected]> Co-developed-by: Peter Zijlstra <[email protected]>
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests/prog_array_init.c')
0 files changed, 0 insertions, 0 deletions