lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <1414219373-20070-1-git-send-email-wangnan0@huawei.com>
Date:	Sat, 25 Oct 2014 14:42:49 +0800
From:	Wang Nan <wangnan0@...wei.com>
To:	<masami.hiramatsu.pt@...achi.com>, <tixy@...aro.org>
CC:	<linux@....linux.org.uk>, <will.deacon@....com>,
	<dave.long@...aro.org>, <taras.kondratiuk@...aro.org>,
	<ben.dooks@...ethink.co.uk>, <cl@...ux.com>, <rabin@....in>,
	<davem@...emloft.net>, <linux-kernel@...r.kernel.org>,
	<linux-arm-kernel@...ts.infradead.org>, <lizefan@...wei.com>
Subject: [PATCH 0/4] ARM: kprobes: introduces instruction checker.

This patch series is part of the version 7 of patch 'ARM: kprobes:
enable OPTPROBES for ARM 32.'. Its main goal is introducing checker
mechanism to give a chance to detail check each probed instructions.
Based on Masami Hiramatsu's suggestion, I make it a dedicated series.

Previous discussions can be found in following threads:

https://lkml.org/lkml/2014/10/22/254
https://lkml.org/lkml/2014/8/27/255
https://lkml.org/lkml/2014/8/12/12
https://lkml.org/lkml/2014/8/8/992
https://lkml.org/lkml/2014/8/8/5
https://lkml.org/lkml/2014/8/5/63

Different from v6, this version redesign checker to make it use seprate
tables other than K/Uprobe action tables, because checkers are not
K/Uprobt specific.

Patch 4/4 in this series also fix a minor bug in kprobe: original ARM
kprobe allows probing on instructions like 'str r0, [sp, r1]', which is
unsafe because we are unable to determine the stack space required to be
protected.  However, this bug exists since 2007, and gcc for ARM
actually doesn't generate code like it.

Wang Nan (4):
  ARM: kprobes: seprates load and store actions
  ARM: kprobes: introduces checker
  ARM: kprobes: collects stack consumption for store instructions
  ARM: kprobes: disallow probing stack consuming instructions

 arch/arm/include/asm/probes.h        |   1 +
 arch/arm/kernel/kprobes-arm.c        |   6 +-
 arch/arm/kernel/kprobes-test-arm.c   |  17 ++--
 arch/arm/kernel/kprobes-test-thumb.c |  13 +++
 arch/arm/kernel/kprobes-thumb.c      |  18 ++--
 arch/arm/kernel/kprobes.c            |  23 ++++-
 arch/arm/kernel/kprobes.h            |   3 +-
 arch/arm/kernel/probes-arm.c         |  41 +++++++--
 arch/arm/kernel/probes-arm.h         |  10 ++-
 arch/arm/kernel/probes-thumb.c       | 168 ++++++++++++++++++++++++++++++-----
 arch/arm/kernel/probes-thumb.h       |  26 ++++--
 arch/arm/kernel/probes.c             | 115 +++++++++++++++++++++++-
 arch/arm/kernel/probes.h             |  24 ++++-
 arch/arm/kernel/uprobes-arm.c        |   6 +-
 arch/arm/kernel/uprobes.c            |   2 +-
 15 files changed, 412 insertions(+), 61 deletions(-)

-- 
1.8.4

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ