[<prev] [next>] [day] [month] [year] [list]
Message-ID: <167588699468.4906.8001929680008508448.tip-bot2@tip-bot2>
Date: Wed, 08 Feb 2023 20:09:54 -0000
From: "tip-bot2 for Nadav Amit" <tip-bot2@...utronix.de>
To: linux-tip-commits@...r.kernel.org
Cc: "Masami Hiramatsu (Google)" <mhiramat@...nel.org>,
Dave Hansen <dave.hansen@...el.com>,
Nadav Amit <namit@...are.com>,
Dave Hansen <dave.hansen@...ux.intel.com>,
"Peter Zijlstra (Intel)" <peterz@...radead.org>, x86@...nel.org,
linux-kernel@...r.kernel.org
Subject: [tip: x86/urgent] x86/kprobes: Fix 1 byte conditional jump target
The following commit has been merged into the x86/urgent branch of tip:
Commit-ID: ae052e3ae09572194d7e574906db7272041577d3
Gitweb: https://git.kernel.org/tip/ae052e3ae09572194d7e574906db7272041577d3
Author: Nadav Amit <namit@...are.com>
AuthorDate: Wed, 08 Feb 2023 07:17:08
Committer: Dave Hansen <dave.hansen@...ux.intel.com>
CommitterDate: Wed, 08 Feb 2023 12:03:27 -08:00
x86/kprobes: Fix 1 byte conditional jump target
Commit 3bc753c06dd0 ("kbuild: treat char as always unsigned") broke
kprobes. Setting a probe-point on 1 byte conditional jump can cause the
kernel to crash when the (signed) relative jump offset gets treated as
unsigned.
Fix by replacing the unsigned 'immediate.bytes' (plus a cast) with the
signed 'immediate.value' when assigning to the relative jump offset.
[ dhansen: clarified changelog ]
Fixes: 3bc753c06dd0 ("kbuild: treat char as always unsigned")
Suggested-by: Masami Hiramatsu (Google) <mhiramat@...nel.org>
Suggested-by: Dave Hansen <dave.hansen@...el.com>
Signed-off-by: Nadav Amit <namit@...are.com>
Signed-off-by: Dave Hansen <dave.hansen@...ux.intel.com>
Acked-by: Peter Zijlstra (Intel) <peterz@...radead.org>
Link: https://lore.kernel.org/all/20230208071708.4048-1-namit%40vmware.com
---
arch/x86/kernel/kprobes/core.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/kernel/kprobes/core.c b/arch/x86/kernel/kprobes/core.c
index b36f3c3..695873c 100644
--- a/arch/x86/kernel/kprobes/core.c
+++ b/arch/x86/kernel/kprobes/core.c
@@ -625,7 +625,7 @@ static int prepare_emulation(struct kprobe *p, struct insn *insn)
/* 1 byte conditional jump */
p->ainsn.emulate_op = kprobe_emulate_jcc;
p->ainsn.jcc.type = opcode & 0xf;
- p->ainsn.rel32 = *(char *)insn->immediate.bytes;
+ p->ainsn.rel32 = insn->immediate.value;
break;
case 0x0f:
opcode = insn->opcode.bytes[1];
Powered by blists - more mailing lists