diff options
author | Peter Zijlstra <peterz@infradead.org> | 2023-08-16 12:44:19 +0200 |
---|---|---|
committer | Peter Zijlstra <peterz@infradead.org> | 2023-08-17 13:24:09 +0200 |
commit | 54097309620ef0dc2d7083783dc521c6a5fef957 (patch) | |
tree | e12360560a5698d578a656e416cd68a234d8271e /kernel | |
parent | dbf46008775516f7f25c95b7760041c286299783 (diff) |
x86/static_call: Fix __static_call_fixup()
Christian reported spurious module load crashes after some of Song's
module memory layout patches.
Turns out that if the very last instruction on the very last page of the
module is a 'JMP __x86_return_thunk' then __static_call_fixup() will
trip a fault and die.
And while the module rework made this slightly more likely to happen,
it's always been possible.
Fixes: ee88d363d156 ("x86,static_call: Use alternative RET encoding")
Reported-by: Christian Bricart <christian@bricart.de>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Acked-by: Josh Poimboeuf <jpoimboe@kernel.org>
Link: https://lkml.kernel.org/r/20230816104419.GA982867@hirez.programming.kicks-ass.net
Diffstat (limited to 'kernel')
0 files changed, 0 insertions, 0 deletions