summaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/stackcollapse.py
diff options
context:
space:
mode:
authorJuergen Gross <jgross@suse.com>2024-10-17 14:47:13 +0200
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-12-19 18:13:23 +0100
commit42d50bb38a691ea8ac459b4f966f7e66f939c147 (patch)
tree2b46d01bff2c65b1160ce690223fa15b5ed822f2 /tools/perf/scripts/python/stackcollapse.py
parent3fbfac0f30441725e87d85d8629fa9dbc673704b (diff)
x86/xen: use new hypercall functions instead of hypercall page
commit b1c2cb86f4a7861480ad54bb9a58df3cbebf8e92 upstream. Call the Xen hypervisor via the new xen_hypercall_func static-call instead of the hypercall page. This is part of XSA-466 / CVE-2024-53241. Reported-by: Andrew Cooper <andrew.cooper3@citrix.com> Signed-off-by: Juergen Gross <jgross@suse.com> Co-developed-by: Peter Zijlstra <peterz@infradead.org> Co-developed-by: Josh Poimboeuf <jpoimboe@redhat.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'tools/perf/scripts/python/stackcollapse.py')
0 files changed, 0 insertions, 0 deletions