[PATCH 0/4] arm64: correctly and consistently handle Xt == XZR
Mark Rutland
mark.rutland at arm.com
Thu Feb 9 07:19:17 PST 2017
Hi,
I spotted that we inconsistently handle the use of Xt when we trap
instructions, and in some cases we may erroneously access SP.
These patches add new helpers to handle this for us, and moves code over to
using them, fixing the erroneous SP usage in the process.
Patch 2 (correcting the trapped CTR_EL0 handling) will need backporting to
stable, and is dependent on patch 1.
Patch 3 is also a fix, but shouldn't need backporting as the patch hasn't made
it into a release yet. Patch 4 is a cleanup for consistency.
Thanks,
Mark.
Mark Rutland (4):
arm64: ptrace: add XZR-safe regs accessors
arm64: traps: correctly handle MRS/MSR with XZR
arm64: cpufeature: correctly handle MRS to XZR
arm64/kprobes: consistently handle MRS/MSR with XZR
arch/arm64/include/asm/ptrace.h | 20 ++++++++++++++++++++
arch/arm64/kernel/cpufeature.c | 2 +-
arch/arm64/kernel/probes/simulate-insn.c | 18 ++++++------------
arch/arm64/kernel/traps.c | 6 ++++--
4 files changed, 31 insertions(+), 15 deletions(-)
--
1.9.1
More information about the linux-arm-kernel
mailing list