[PATCH 0/4] arm64: correctly and consistently handle Xt == XZR

Mark Rutland mark.rutland at arm.com
Thu Feb 9 07:19:17 PST 2017


Hi,

I spotted that we inconsistently handle the use of Xt when we trap
instructions, and in some cases we may erroneously access SP.

These patches add new helpers to handle this for us, and moves code over to
using them, fixing the erroneous SP usage in the process.

Patch 2 (correcting the trapped CTR_EL0 handling) will need backporting to
stable, and is dependent on patch 1.

Patch 3 is also a fix, but shouldn't need backporting as the patch hasn't made
it into a release yet. Patch 4 is a cleanup for consistency.

Thanks,
Mark.

Mark Rutland (4):
  arm64: ptrace: add XZR-safe regs accessors
  arm64: traps: correctly handle MRS/MSR with XZR
  arm64: cpufeature: correctly handle MRS to XZR
  arm64/kprobes: consistently handle MRS/MSR with XZR

 arch/arm64/include/asm/ptrace.h          | 20 ++++++++++++++++++++
 arch/arm64/kernel/cpufeature.c           |  2 +-
 arch/arm64/kernel/probes/simulate-insn.c | 18 ++++++------------
 arch/arm64/kernel/traps.c                |  6 ++++--
 4 files changed, 31 insertions(+), 15 deletions(-)

-- 
1.9.1




More information about the linux-arm-kernel mailing list