kernel-ark/arch/x86_64/kernel
Satoshi Oshima dc49e3445a [PATCH] kprobes: bad manipulation of 2 byte opcode on x86_64
Problem:

If we put a probe onto a callq instruction and the probe is executed,
kernel panic of Bad RIP value occurs.

Root cause:

If resume_execution() found 0xff at first byte of p->ainsn.insn, it must
check the _second_ byte.  But current resume_execution check _first_ byte
again.

I changed it checks second byte of p->ainsn.insn.

Kprobes on i386 don't have this problem, because the implementation is a
little bit different from x86_64.

Cc: Andi Kleen <ak@muc.de>
Signed-off-by: Satoshi Oshima <soshima@redhat.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-05-21 12:59:21 -07:00
..
acpi
cpufreq
aperture.c
apic.c
asm-offsets.c
crash_dump.c
crash.c
e820.c [PATCH] x86_64: Avoid EBDA area in early boot allocator 2006-05-08 09:34:56 -07:00
early_printk.c
entry.S
functionlist
genapic_cluster.c
genapic_flat.c
genapic.c
head64.c
head.S
i387.c
i8259.c
init_task.c
io_apic.c [PATCH] x86_64: avoid IRQ0 ioapic pin collision 2006-05-08 09:34:56 -07:00
ioport.c
irq.c
kprobes.c [PATCH] kprobes: bad manipulation of 2 byte opcode on x86_64 2006-05-21 12:59:21 -07:00
ldt.c
machine_kexec.c
Makefile
mce_amd.c
mce_intel.c
mce.c
module.c
mpparse.c [PATCH] x86_64: avoid IRQ0 ioapic pin collision 2006-05-08 09:34:56 -07:00
nmi.c
pci-dma.c
pci-gart.c [PATCH] x86_64: Check for too many northbridges in IOMMU code 2006-05-08 09:34:56 -07:00
pci-nommu.c [PATCH] x86_64: Don't warn for overflow in nommu case when dma_mask is < 32bit 2006-05-16 07:59:31 -07:00
pci-swiotlb.c
pmtimer.c
process.c
ptrace.c
reboot.c
relocate_kernel.S
setup64.c
setup.c [PATCH] x86_64: Avoid EBDA area in early boot allocator 2006-05-08 09:34:56 -07:00
signal.c
smp.c
smpboot.c
suspend_asm.S
suspend.c
sys_x86_64.c
syscall.c
time.c
trampoline.S
traps.c [PATCH] x86_64: Don't schedule on exception stack on preemptive kernels 2006-05-16 07:59:32 -07:00
vmlinux.lds.S
vsmp.c
vsyscall.c
x8664_ksyms.c