[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <152587066475.17316.3035446966107675608.stgit@devbox>
Date: Wed, 9 May 2018 21:57:44 +0900
From: Masami Hiramatsu <mhiramat@...nel.org>
To: x86@...nel.org, LKML <linux-kernel@...r.kernel.org>,
Linus Torvalds <torvalds@...ux-foundation.org>,
Oleg Nesterov <oleg@...hat.com>, Ingo Molnar <mingo@...nel.org>
Cc: Andy Lutomirski <luto@...nel.org>,
Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>,
"H . Peter Anvin" <hpa@...or.com>,
Alexei Starovoitov <ast@...nel.org>,
Masami Hiramatsu <mhiramat@...nel.org>,
"David S . Miller" <davem@...emloft.net>,
Steven Rostedt <rostedt@...dmis.org>,
Francis Deslauriers <francis.deslauriers@...icios.com>,
Ricardo Neri <ricardo.neri-calderon@...ux.intel.com>,
Borislav Petkov <bp@...e.de>, Yonghong Song <yhs@...com>
Subject: [PATCH 0/2] uprobes: x86: Reject probing MOV SS
Hi,
I found the CVE-2018-1087 and CVE-2018-8897 should
be related to kprobes and uprobes too, since both
are using #DB for single stepping.
I decided to just reject probes on MOV SS and POP SS
because those are not recommended to use (Intel SDM
recommend to use LSS instead), thus it might be
rare case.
Oleg, could you review the uprobes patch?
Thank you,
---
Masami Hiramatsu (2):
kprobes: x86: Prohibit probing on exception masking instructions
uprobes: x86: Prohibit probing on MOV SS instruction
arch/x86/include/asm/insn.h | 18 ++++++++++++++++++
arch/x86/kernel/kprobes/core.c | 4 ++++
arch/x86/kernel/uprobes.c | 4 ++++
3 files changed, 26 insertions(+)
--
Masami Hiramatsu (Linaro) <mhiramat@...nel.org>
Powered by blists - more mailing lists