mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-06 06:26:40 +07:00
75013fb16f
Fix to the exception table entry check by using probed address instead of the address of copied instruction. This bug may cause unexpected kernel panic if user probe an address where an exception can happen which should be fixup by __ex_table (e.g. copy_from_user.) Unless user puts a kprobe on such address, this doesn't cause any problem. This bug has been introduced years ago, by commit:464846888d
("x86/kprobes: Fix a bug which can modify kernel code permanently"). Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org> Cc: Borislav Petkov <bp@alien8.de> Cc: Linus Torvalds <torvalds@linux-foundation.org> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Thomas Gleixner <tglx@linutronix.de> Fixes:464846888d
("x86/kprobes: Fix a bug which can modify kernel code permanently") Link: http://lkml.kernel.org/r/148829899399.28855.12581062400757221722.stgit@devbox Signed-off-by: Ingo Molnar <mingo@kernel.org>
109 lines
2.7 KiB
C
109 lines
2.7 KiB
C
#ifndef __X86_KERNEL_KPROBES_COMMON_H
|
|
#define __X86_KERNEL_KPROBES_COMMON_H
|
|
|
|
/* Kprobes and Optprobes common header */
|
|
|
|
#ifdef CONFIG_X86_64
|
|
#define SAVE_REGS_STRING \
|
|
/* Skip cs, ip, orig_ax. */ \
|
|
" subq $24, %rsp\n" \
|
|
" pushq %rdi\n" \
|
|
" pushq %rsi\n" \
|
|
" pushq %rdx\n" \
|
|
" pushq %rcx\n" \
|
|
" pushq %rax\n" \
|
|
" pushq %r8\n" \
|
|
" pushq %r9\n" \
|
|
" pushq %r10\n" \
|
|
" pushq %r11\n" \
|
|
" pushq %rbx\n" \
|
|
" pushq %rbp\n" \
|
|
" pushq %r12\n" \
|
|
" pushq %r13\n" \
|
|
" pushq %r14\n" \
|
|
" pushq %r15\n"
|
|
#define RESTORE_REGS_STRING \
|
|
" popq %r15\n" \
|
|
" popq %r14\n" \
|
|
" popq %r13\n" \
|
|
" popq %r12\n" \
|
|
" popq %rbp\n" \
|
|
" popq %rbx\n" \
|
|
" popq %r11\n" \
|
|
" popq %r10\n" \
|
|
" popq %r9\n" \
|
|
" popq %r8\n" \
|
|
" popq %rax\n" \
|
|
" popq %rcx\n" \
|
|
" popq %rdx\n" \
|
|
" popq %rsi\n" \
|
|
" popq %rdi\n" \
|
|
/* Skip orig_ax, ip, cs */ \
|
|
" addq $24, %rsp\n"
|
|
#else
|
|
#define SAVE_REGS_STRING \
|
|
/* Skip cs, ip, orig_ax and gs. */ \
|
|
" subl $16, %esp\n" \
|
|
" pushl %fs\n" \
|
|
" pushl %es\n" \
|
|
" pushl %ds\n" \
|
|
" pushl %eax\n" \
|
|
" pushl %ebp\n" \
|
|
" pushl %edi\n" \
|
|
" pushl %esi\n" \
|
|
" pushl %edx\n" \
|
|
" pushl %ecx\n" \
|
|
" pushl %ebx\n"
|
|
#define RESTORE_REGS_STRING \
|
|
" popl %ebx\n" \
|
|
" popl %ecx\n" \
|
|
" popl %edx\n" \
|
|
" popl %esi\n" \
|
|
" popl %edi\n" \
|
|
" popl %ebp\n" \
|
|
" popl %eax\n" \
|
|
/* Skip ds, es, fs, gs, orig_ax, and ip. Note: don't pop cs here*/\
|
|
" addl $24, %esp\n"
|
|
#endif
|
|
|
|
/* Ensure if the instruction can be boostable */
|
|
extern int can_boost(kprobe_opcode_t *instruction, void *addr);
|
|
/* Recover instruction if given address is probed */
|
|
extern unsigned long recover_probed_instruction(kprobe_opcode_t *buf,
|
|
unsigned long addr);
|
|
/*
|
|
* Copy an instruction and adjust the displacement if the instruction
|
|
* uses the %rip-relative addressing mode.
|
|
*/
|
|
extern int __copy_instruction(u8 *dest, u8 *src);
|
|
|
|
/* Generate a relative-jump/call instruction */
|
|
extern void synthesize_reljump(void *from, void *to);
|
|
extern void synthesize_relcall(void *from, void *to);
|
|
|
|
#ifdef CONFIG_OPTPROBES
|
|
extern int setup_detour_execution(struct kprobe *p, struct pt_regs *regs, int reenter);
|
|
extern unsigned long __recover_optprobed_insn(kprobe_opcode_t *buf, unsigned long addr);
|
|
#else /* !CONFIG_OPTPROBES */
|
|
static inline int setup_detour_execution(struct kprobe *p, struct pt_regs *regs, int reenter)
|
|
{
|
|
return 0;
|
|
}
|
|
static inline unsigned long __recover_optprobed_insn(kprobe_opcode_t *buf, unsigned long addr)
|
|
{
|
|
return addr;
|
|
}
|
|
#endif
|
|
|
|
#ifdef CONFIG_KPROBES_ON_FTRACE
|
|
extern int skip_singlestep(struct kprobe *p, struct pt_regs *regs,
|
|
struct kprobe_ctlblk *kcb);
|
|
#else
|
|
static inline int skip_singlestep(struct kprobe *p, struct pt_regs *regs,
|
|
struct kprobe_ctlblk *kcb)
|
|
{
|
|
return 0;
|
|
}
|
|
#endif
|
|
#endif
|