diff options
author | Satoshi Oshima <soshima@redhat.com> | 2006-05-20 15:00:21 -0700 |
---|---|---|
committer | Linus Torvalds <torvalds@g5.osdl.org> | 2006-05-21 12:59:21 -0700 |
commit | dc49e3445aa703eb7fd33c7ddb7e4a7bbcf06d30 (patch) | |
tree | eb164ad61b92f2df2ffab9628adffe06e635c8e2 /kernel/timer.c | |
parent | be0d03f1c3d3612fe2b6aa451ae87a89382c9231 (diff) |
[PATCH] kprobes: bad manipulation of 2 byte opcode on x86_64
Problem:
If we put a probe onto a callq instruction and the probe is executed,
kernel panic of Bad RIP value occurs.
Root cause:
If resume_execution() found 0xff at first byte of p->ainsn.insn, it must
check the _second_ byte. But current resume_execution check _first_ byte
again.
I changed it checks second byte of p->ainsn.insn.
Kprobes on i386 don't have this problem, because the implementation is a
little bit different from x86_64.
Cc: Andi Kleen <ak@muc.de>
Signed-off-by: Satoshi Oshima <soshima@redhat.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
Diffstat (limited to 'kernel/timer.c')
0 files changed, 0 insertions, 0 deletions