mirror of
https://github.com/torvalds/linux.git
synced 2024-12-15 15:41:58 +00:00
64ad946152
misleading/wrong stacktraces and confuse RELIABLE_STACKTRACE and LIVEPATCH as the backtrace misses the function which is being fixed up. - Add Straight Light Speculation mitigation support which uses a new compiler switch -mharden-sls= which sticks an INT3 after a RET or an indirect branch in order to block speculation after them. Reportedly, CPUs do speculate behind such insns. - The usual set of cleanups and improvements -----BEGIN PGP SIGNATURE----- iQIyBAABCgAdFiEEzv7L6UO9uDPlPSfHEsHwGGHeVUoFAmHfKA0ACgkQEsHwGGHe VUqLJg/2I2X2xXr5filJVaK+sQgmvDzk67DKnbxRBW2xcPF+B5sSW5yhe3G5UPW7 SJVdhQ3gHcTiliGGlBf/VE7KXbqxFN0vO4/VFHZm78r43g7OrXTxz6WXXQRJ1n67 U3YwRH3b6cqXZNFMs+X4bJt6qsGJM1kdTTZ2as4aERnaFr5AOAfQvfKbyhxLe/XA 3SakfYISVKCBQ2RkTfpMpwmqlsatGFhTC5IrvuDQ83dDsM7O+Dx1J6Gu3fwjKmie iVzPOjCh+xTpZQp/SIZmt7MzoduZvpSym4YVyHvEnMiexQT4AmyaRthWqrhnEXY/ qOvj8/XIqxmix8EaooGqRIK0Y2ZegxkPckNFzaeC3lsWohwMIGIhNXwHNEeuhNyH yvNGAW9Cq6NeDRgz5MRUXcimYw4P4oQKYLObS1WqFZhNMqm4sNtoEAYpai/lPYfs zUDckgXF2AoPOsSqy3hFAVaGovAgzfDaJVzkt0Lk4kzzjX2WQiNLhmiior460w+K 0l2Iej58IajSp3MkWmFH368Jo8YfUVmkjbbpsmjsBppA08e1xamJB7RmswI/Ezj6 s5re6UioCD+UYdjWx41kgbvYdvIkkZ2RLrktoZd/hqHrOLWEIiwEbyFO2nRFJIAh YjvPkB1p7iNuAeYcP1x9Ft9GNYVIsUlJ+hK86wtFCqy+abV+zQ== =R52z -----END PGP SIGNATURE----- Merge tag 'x86_core_for_v5.17_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip Pull x86 core updates from Borislav Petkov: - Get rid of all the .fixup sections because this generates misleading/wrong stacktraces and confuse RELIABLE_STACKTRACE and LIVEPATCH as the backtrace misses the function which is being fixed up. - Add Straight Line Speculation mitigation support which uses a new compiler switch -mharden-sls= which sticks an INT3 after a RET or an indirect branch in order to block speculation after them. Reportedly, CPUs do speculate behind such insns. - The usual set of cleanups and improvements * tag 'x86_core_for_v5.17_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: (32 commits) x86/entry_32: Fix segment exceptions objtool: Remove .fixup handling x86: Remove .fixup section x86/word-at-a-time: Remove .fixup usage x86/usercopy: Remove .fixup usage x86/usercopy_32: Simplify __copy_user_intel_nocache() x86/sgx: Remove .fixup usage x86/checksum_32: Remove .fixup usage x86/vmx: Remove .fixup usage x86/kvm: Remove .fixup usage x86/segment: Remove .fixup usage x86/fpu: Remove .fixup usage x86/xen: Remove .fixup usage x86/uaccess: Remove .fixup usage x86/futex: Remove .fixup usage x86/msr: Remove .fixup usage x86/extable: Extend extable functionality x86/entry_32: Remove .fixup usage x86/entry_64: Remove .fixup usage x86/copy_mc_64: Remove .fixup usage ...
48 lines
1.6 KiB
C
48 lines
1.6 KiB
C
#ifndef _ASM_X86_INSN_EVAL_H
|
|
#define _ASM_X86_INSN_EVAL_H
|
|
/*
|
|
* A collection of utility functions for x86 instruction analysis to be
|
|
* used in a kernel context. Useful when, for instance, making sense
|
|
* of the registers indicated by operands.
|
|
*/
|
|
|
|
#include <linux/compiler.h>
|
|
#include <linux/bug.h>
|
|
#include <linux/err.h>
|
|
#include <asm/ptrace.h>
|
|
|
|
#define INSN_CODE_SEG_ADDR_SZ(params) ((params >> 4) & 0xf)
|
|
#define INSN_CODE_SEG_OPND_SZ(params) (params & 0xf)
|
|
#define INSN_CODE_SEG_PARAMS(oper_sz, addr_sz) (oper_sz | (addr_sz << 4))
|
|
|
|
int pt_regs_offset(struct pt_regs *regs, int regno);
|
|
|
|
bool insn_has_rep_prefix(struct insn *insn);
|
|
void __user *insn_get_addr_ref(struct insn *insn, struct pt_regs *regs);
|
|
int insn_get_modrm_rm_off(struct insn *insn, struct pt_regs *regs);
|
|
int insn_get_modrm_reg_off(struct insn *insn, struct pt_regs *regs);
|
|
unsigned long *insn_get_modrm_reg_ptr(struct insn *insn, struct pt_regs *regs);
|
|
unsigned long insn_get_seg_base(struct pt_regs *regs, int seg_reg_idx);
|
|
int insn_get_code_seg_params(struct pt_regs *regs);
|
|
int insn_get_effective_ip(struct pt_regs *regs, unsigned long *ip);
|
|
int insn_fetch_from_user(struct pt_regs *regs,
|
|
unsigned char buf[MAX_INSN_SIZE]);
|
|
int insn_fetch_from_user_inatomic(struct pt_regs *regs,
|
|
unsigned char buf[MAX_INSN_SIZE]);
|
|
bool insn_decode_from_regs(struct insn *insn, struct pt_regs *regs,
|
|
unsigned char buf[MAX_INSN_SIZE], int buf_size);
|
|
|
|
enum mmio_type {
|
|
MMIO_DECODE_FAILED,
|
|
MMIO_WRITE,
|
|
MMIO_WRITE_IMM,
|
|
MMIO_READ,
|
|
MMIO_READ_ZERO_EXTEND,
|
|
MMIO_READ_SIGN_EXTEND,
|
|
MMIO_MOVS,
|
|
};
|
|
|
|
enum mmio_type insn_decode_mmio(struct insn *insn, int *bytes);
|
|
|
|
#endif /* _ASM_X86_INSN_EVAL_H */
|