[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <156759754770.24473.11832897710080799131.stgit@devnote2>
Date: Wed, 4 Sep 2019 20:45:47 +0900
From: Masami Hiramatsu <mhiramat@...nel.org>
To: Ingo Molnar <mingo@...nel.org>
Cc: Josh Poimboeuf <jpoimboe@...hat.com>,
Peter Zijlstra <peterz@...radead.org>,
Randy Dunlap <rdunlap@...radead.org>,
Borislav Petkov <bp@...en8.de>,
Juergen Gross <jgross@...e.com>,
Boris Ostrovsky <boris.ostrovsky@...cle.com>,
Stefano Stabellini <sstabellini@...nel.org>, x86@...nel.org,
linux-kernel@...r.kernel.org, xen-devel@...ts.xenproject.org
Subject: [PATCH -tip 0/2] x86: Prohibit kprobes on XEN_EMULATE_PREFIX
Hi,
These patches allow x86 instruction decoder to decode
xen-cpuid which has XEN_EMULATE_PREFIX, and prohibit
kprobes to probe on it.
Josh reported that the objtool can not decode such special
prefixed instructions, and I found that we also have to
prohibit kprobes to probe on such instruction.
This series can be applied on -tip master branch which
has merged Josh's objtool/perf sharing common x86 insn
decoder series.
Thank you,
---
Masami Hiramatsu (2):
x86: xen: insn: Decode XEN_EMULATE_PREFIX correctly
x86: kprobes: Prohibit probing on instruction which has Xen prefix
arch/x86/include/asm/insn.h | 2 +
arch/x86/include/asm/xen/interface.h | 7 ++++-
arch/x86/include/asm/xen/prefix.h | 10 +++++++
arch/x86/kernel/kprobes/core.c | 4 +++
arch/x86/lib/insn.c | 43 +++++++++++++++++++++++++++++++
tools/arch/x86/include/asm/insn.h | 2 +
tools/arch/x86/include/asm/xen/prefix.h | 10 +++++++
tools/arch/x86/lib/insn.c | 43 +++++++++++++++++++++++++++++++
tools/objtool/sync-check.sh | 3 +-
9 files changed, 121 insertions(+), 3 deletions(-)
create mode 100644 arch/x86/include/asm/xen/prefix.h
create mode 100644 tools/arch/x86/include/asm/xen/prefix.h
--
Masami Hiramatsu (Linaro) <mhiramat@...nel.org>
Powered by blists - more mailing lists