Re: [PATCH] x86/kprobes: Fix optprobe to detect padding int3 correctly

2020-12-11 Thread Adam Zabrocki
Hi, I've applied this patch on the top of kernel 5.9.7 and verified it works fine: 813050e0 : ... ... 813052f1: e9 fe fe ff ff jmpq 813051f4 813052f6: cc int3 813052f7: cc int3 ff

Re: [PATCH] x86/kprobes: Fix optprobe to detect padding int3 correctly

2020-12-11 Thread Kees Cook
On Fri, Dec 11, 2020 at 04:04:17PM +0900, Masami Hiramatsu wrote: > Fix optprobe to detect padding int3 correctly. > > Since commit 7705dc855797 ("x86/vmlinux: Use INT3 instead of NOP > for linker fill bytes") changed the padding bytes between functions > from nop to int3, when optprobe decodes a

Re: [PATCH] x86/kprobes: Fix optprobe to detect padding int3 correctly

2020-12-11 Thread Steven Rostedt
On Fri, 11 Dec 2020 16:04:17 +0900 Masami Hiramatsu wrote: > Fix optprobe to detect padding int3 correctly. > > Since commit 7705dc855797 ("x86/vmlinux: Use INT3 instead of NOP > for linker fill bytes") changed the padding bytes between functions > from nop to int3, when optprobe decodes a targe

[PATCH] x86/kprobes: Fix optprobe to detect padding int3 correctly

2020-12-10 Thread Masami Hiramatsu
Fix optprobe to detect padding int3 correctly. Since commit 7705dc855797 ("x86/vmlinux: Use INT3 instead of NOP for linker fill bytes") changed the padding bytes between functions from nop to int3, when optprobe decodes a target function it finds int3 and gives up the jump optimization. Instead o