All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH 0/2] uprobes: x86: Reject probing MOV SS
@ 2018-05-09 12:57 Masami Hiramatsu
  2018-05-09 12:58 ` [PATCH 1/2] kprobes: x86: Prohibit probing on exception masking instructions Masami Hiramatsu
                   ` (3 more replies)
  0 siblings, 4 replies; 9+ messages in thread
From: Masami Hiramatsu @ 2018-05-09 12:57 UTC (permalink / raw)
  To: x86, LKML, Linus Torvalds, Oleg Nesterov, Ingo Molnar
  Cc: Andy Lutomirski, Thomas Gleixner, Ingo Molnar, H . Peter Anvin,
	Alexei Starovoitov, Masami Hiramatsu, David S . Miller,
	Steven Rostedt, Francis Deslauriers, Ricardo Neri,
	Borislav Petkov, Yonghong Song

Hi,

I found the CVE-2018-1087 and CVE-2018-8897 should
be related to kprobes and uprobes too, since both
are using #DB for single stepping.

I decided to just reject probes on MOV SS and POP SS
because those are not recommended to use (Intel SDM
recommend to use LSS instead), thus it might be
rare case.

Oleg, could you review the uprobes patch?

Thank you,

---

Masami Hiramatsu (2):
      kprobes: x86: Prohibit probing on exception masking instructions
      uprobes: x86: Prohibit probing on MOV SS instruction


 arch/x86/include/asm/insn.h    |   18 ++++++++++++++++++
 arch/x86/kernel/kprobes/core.c |    4 ++++
 arch/x86/kernel/uprobes.c      |    4 ++++
 3 files changed, 26 insertions(+)

--
Masami Hiramatsu (Linaro) <mhiramat@kernel.org>

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [PATCH 1/2] kprobes: x86: Prohibit probing on exception masking instructions
  2018-05-09 12:57 [PATCH 0/2] uprobes: x86: Reject probing MOV SS Masami Hiramatsu
@ 2018-05-09 12:58 ` Masami Hiramatsu
  2018-05-13 17:57   ` [tip:x86/urgent] kprobes/x86: " tip-bot for Masami Hiramatsu
  2018-05-09 12:58 ` [PATCH 2/2] uprobes: x86: Prohibit probing on MOV SS instruction Masami Hiramatsu
                   ` (2 subsequent siblings)
  3 siblings, 1 reply; 9+ messages in thread
From: Masami Hiramatsu @ 2018-05-09 12:58 UTC (permalink / raw)
  To: x86, LKML, Linus Torvalds, Oleg Nesterov, Ingo Molnar
  Cc: Andy Lutomirski, Thomas Gleixner, Ingo Molnar, H . Peter Anvin,
	Alexei Starovoitov, Masami Hiramatsu, David S . Miller,
	Steven Rostedt, Francis Deslauriers, Ricardo Neri,
	Borislav Petkov, Yonghong Song

Since MOV SS and POP SS instructions will delay the exceptions
until the next instruction is executed, we should not do
single-stepping on it by kprobes.

However, kprobes usually executes those instructions directly
on trampoline buffer (a.k.a. kprobe-booster), except for the
kprobes which has post_handler. Thus if kprobe user probes MOV SS
with post_handler, it will do single-stepping on the MOV SS.

This means it is safe that if we use it via ftrace or perf/bpf
since those don't use the post_handler.

Anyway, since the stack switching is a rare case, it is safer
just rejecting kprobes on such instructions.

Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org>
---
 arch/x86/include/asm/insn.h    |   18 ++++++++++++++++++
 arch/x86/kernel/kprobes/core.c |    4 ++++
 2 files changed, 22 insertions(+)

diff --git a/arch/x86/include/asm/insn.h b/arch/x86/include/asm/insn.h
index b3e32b010ab1..c2c01f84df75 100644
--- a/arch/x86/include/asm/insn.h
+++ b/arch/x86/include/asm/insn.h
@@ -208,4 +208,22 @@ static inline int insn_offset_immediate(struct insn *insn)
 	return insn_offset_displacement(insn) + insn->displacement.nbytes;
 }
 
+#define POP_SS_OPCODE 0x1f
+#define MOV_SREG_OPCODE 0x8e
+
+/*
+ * Intel SDM Vol.3A 6.8.3 states;
+ * "Any single-step trap that would be delivered following the MOV to SS
+ * instruction or POP to SS instruction (because EFLAGS.TF is 1) is
+ * suppressed."
+ * This function returns true if @insn is MOV SS or POP SS. On these
+ * instructions, single stepping is suppressed.
+ */
+static inline int insn_masking_exception(struct insn *insn)
+{
+	return insn->opcode.bytes[0] == POP_SS_OPCODE ||
+		(insn->opcode.bytes[0] == MOV_SREG_OPCODE &&
+		 X86_MODRM_REG(insn->modrm.bytes[0]) == 2);
+}
+
 #endif /* _ASM_X86_INSN_H */
diff --git a/arch/x86/kernel/kprobes/core.c b/arch/x86/kernel/kprobes/core.c
index 0715f827607c..6f4d42377fe5 100644
--- a/arch/x86/kernel/kprobes/core.c
+++ b/arch/x86/kernel/kprobes/core.c
@@ -370,6 +370,10 @@ int __copy_instruction(u8 *dest, u8 *src, u8 *real, struct insn *insn)
 	if (insn->opcode.bytes[0] == BREAKPOINT_INSTRUCTION)
 		return 0;
 
+	/* We should not singlestep on the exception masking instructions */
+	if (insn_masking_exception(insn))
+		return 0;
+
 #ifdef CONFIG_X86_64
 	/* Only x86_64 has RIP relative instructions */
 	if (insn_rip_relative(insn)) {

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [PATCH 2/2] uprobes: x86: Prohibit probing on MOV SS instruction
  2018-05-09 12:57 [PATCH 0/2] uprobes: x86: Reject probing MOV SS Masami Hiramatsu
  2018-05-09 12:58 ` [PATCH 1/2] kprobes: x86: Prohibit probing on exception masking instructions Masami Hiramatsu
@ 2018-05-09 12:58 ` Masami Hiramatsu
  2018-05-09 16:39   ` Oleg Nesterov
  2018-05-13 17:58   ` [tip:x86/urgent] uprobes/x86: " tip-bot for Masami Hiramatsu
  2018-05-09 13:01 ` [PATCH 0/2] uprobes: kprobes: x86: Reject probing MOV SS/POP SS Masami Hiramatsu
  2018-05-09 14:36 ` [PATCH 0/2] uprobes: x86: Reject probing MOV SS Andy Lutomirski
  3 siblings, 2 replies; 9+ messages in thread
From: Masami Hiramatsu @ 2018-05-09 12:58 UTC (permalink / raw)
  To: x86, LKML, Linus Torvalds, Oleg Nesterov, Ingo Molnar
  Cc: Andy Lutomirski, Thomas Gleixner, Ingo Molnar, H . Peter Anvin,
	Alexei Starovoitov, Masami Hiramatsu, David S . Miller,
	Steven Rostedt, Francis Deslauriers, Ricardo Neri,
	Borislav Petkov, Yonghong Song

Since MOV SS and POP SS instructions will delay the exceptions
until the next instruction is executed, we should not do
single-stepping on it by uprobes.

uprobe already rejects probing on POP SS (0x1f), but allows
probing on MOV SS (0x8e and reg == 2).
This checks the target instruction and if it is MOV SS
or POP SS, returns -ENOTSUPP to reject probing.

Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org>
---
 arch/x86/kernel/uprobes.c |    4 ++++
 1 file changed, 4 insertions(+)

diff --git a/arch/x86/kernel/uprobes.c b/arch/x86/kernel/uprobes.c
index 85c7ef23d99f..c84bb5396958 100644
--- a/arch/x86/kernel/uprobes.c
+++ b/arch/x86/kernel/uprobes.c
@@ -299,6 +299,10 @@ static int uprobe_init_insn(struct arch_uprobe *auprobe, struct insn *insn, bool
 	if (is_prefix_bad(insn))
 		return -ENOTSUPP;
 
+	/* We should not singlestep on the exception masking instructions */
+	if (insn_masking_exception(insn))
+		return -ENOTSUPP;
+
 	if (x86_64)
 		good_insns = good_insns_64;
 	else

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [PATCH 0/2] uprobes: kprobes: x86: Reject probing MOV SS/POP SS
  2018-05-09 12:57 [PATCH 0/2] uprobes: x86: Reject probing MOV SS Masami Hiramatsu
  2018-05-09 12:58 ` [PATCH 1/2] kprobes: x86: Prohibit probing on exception masking instructions Masami Hiramatsu
  2018-05-09 12:58 ` [PATCH 2/2] uprobes: x86: Prohibit probing on MOV SS instruction Masami Hiramatsu
@ 2018-05-09 13:01 ` Masami Hiramatsu
  2018-05-09 14:36 ` [PATCH 0/2] uprobes: x86: Reject probing MOV SS Andy Lutomirski
  3 siblings, 0 replies; 9+ messages in thread
From: Masami Hiramatsu @ 2018-05-09 13:01 UTC (permalink / raw)
  To: Masami Hiramatsu
  Cc: x86, LKML, Linus Torvalds, Oleg Nesterov, Ingo Molnar,
	Andy Lutomirski, Thomas Gleixner, Ingo Molnar, H . Peter Anvin,
	Alexei Starovoitov, David S . Miller, Steven Rostedt,
	Francis Deslauriers, Ricardo Neri, Borislav Petkov,
	Yonghong Song


Oops, I missed adding kprobes: and POP SS on subject...
	

On Wed,  9 May 2018 21:57:44 +0900
Masami Hiramatsu <mhiramat@kernel.org> wrote:

> Hi,
> 
> I found the CVE-2018-1087 and CVE-2018-8897 should
> be related to kprobes and uprobes too, since both
> are using #DB for single stepping.
> 
> I decided to just reject probes on MOV SS and POP SS
> because those are not recommended to use (Intel SDM
> recommend to use LSS instead), thus it might be
> rare case.
>
> Oleg, could you review the uprobes patch?
> 
> Thank you,
> 
> ---
> 
> Masami Hiramatsu (2):
>       kprobes: x86: Prohibit probing on exception masking instructions
>       uprobes: x86: Prohibit probing on MOV SS instruction
> 
> 
>  arch/x86/include/asm/insn.h    |   18 ++++++++++++++++++
>  arch/x86/kernel/kprobes/core.c |    4 ++++
>  arch/x86/kernel/uprobes.c      |    4 ++++
>  3 files changed, 26 insertions(+)
> 
> --
> Masami Hiramatsu (Linaro) <mhiramat@kernel.org>


-- 
Masami Hiramatsu <mhiramat@kernel.org>

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH 0/2] uprobes: x86: Reject probing MOV SS
  2018-05-09 12:57 [PATCH 0/2] uprobes: x86: Reject probing MOV SS Masami Hiramatsu
                   ` (2 preceding siblings ...)
  2018-05-09 13:01 ` [PATCH 0/2] uprobes: kprobes: x86: Reject probing MOV SS/POP SS Masami Hiramatsu
@ 2018-05-09 14:36 ` Andy Lutomirski
  2018-05-09 22:25   ` Masami Hiramatsu
  3 siblings, 1 reply; 9+ messages in thread
From: Andy Lutomirski @ 2018-05-09 14:36 UTC (permalink / raw)
  To: Masami Hiramatsu
  Cc: X86 ML, LKML, Linus Torvalds, Oleg Nesterov, Ingo Molnar,
	Andrew Lutomirski, Thomas Gleixner, Ingo Molnar, H. Peter Anvin,
	Alexei Starovoitov, David S. Miller, Steven Rostedt,
	francis.deslauriers, Ricardo Neri, Borislav Petkov,
	Yonghong Song

On Wed, May 9, 2018 at 5:58 AM Masami Hiramatsu <mhiramat@kernel.org> wrote:

> Hi,

> I found the CVE-2018-1087 and CVE-2018-8897 should
> be related to kprobes and uprobes too, since both
> are using #DB for single stepping.


Seems okay to me.  I doubt we have a security problem, but I can easily
imagine that the probes wouldn't work right.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH 2/2] uprobes: x86: Prohibit probing on MOV SS instruction
  2018-05-09 12:58 ` [PATCH 2/2] uprobes: x86: Prohibit probing on MOV SS instruction Masami Hiramatsu
@ 2018-05-09 16:39   ` Oleg Nesterov
  2018-05-13 17:58   ` [tip:x86/urgent] uprobes/x86: " tip-bot for Masami Hiramatsu
  1 sibling, 0 replies; 9+ messages in thread
From: Oleg Nesterov @ 2018-05-09 16:39 UTC (permalink / raw)
  To: Masami Hiramatsu
  Cc: x86, LKML, Linus Torvalds, Ingo Molnar, Andy Lutomirski,
	Thomas Gleixner, Ingo Molnar, H . Peter Anvin,
	Alexei Starovoitov, David S . Miller, Steven Rostedt,
	Francis Deslauriers, Ricardo Neri, Borislav Petkov,
	Yonghong Song

On 05/09, Masami Hiramatsu wrote:
>
> Since MOV SS and POP SS instructions will delay the exceptions
> until the next instruction is executed, we should not do
> single-stepping on it by uprobes.
...
> --- a/arch/x86/kernel/uprobes.c
> +++ b/arch/x86/kernel/uprobes.c
> @@ -299,6 +299,10 @@ static int uprobe_init_insn(struct arch_uprobe *auprobe, struct insn *insn, bool
>  	if (is_prefix_bad(insn))
>  		return -ENOTSUPP;
>  
> +	/* We should not singlestep on the exception masking instructions */
> +	if (insn_masking_exception(insn))
> +		return -ENOTSUPP;

Acked-by: Oleg Nesterov <oleg@redhat.com>

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH 0/2] uprobes: x86: Reject probing MOV SS
  2018-05-09 14:36 ` [PATCH 0/2] uprobes: x86: Reject probing MOV SS Andy Lutomirski
@ 2018-05-09 22:25   ` Masami Hiramatsu
  0 siblings, 0 replies; 9+ messages in thread
From: Masami Hiramatsu @ 2018-05-09 22:25 UTC (permalink / raw)
  To: Andy Lutomirski
  Cc: X86 ML, LKML, Linus Torvalds, Oleg Nesterov, Ingo Molnar,
	Thomas Gleixner, Ingo Molnar, H. Peter Anvin, Alexei Starovoitov,
	David S. Miller, Steven Rostedt, francis.deslauriers,
	Ricardo Neri, Borislav Petkov, Yonghong Song

On Wed, 09 May 2018 14:36:27 +0000
Andy Lutomirski <luto@kernel.org> wrote:

> On Wed, May 9, 2018 at 5:58 AM Masami Hiramatsu <mhiramat@kernel.org> wrote:
> 
> > Hi,
> 
> > I found the CVE-2018-1087 and CVE-2018-8897 should
> > be related to kprobes and uprobes too, since both
> > are using #DB for single stepping.
> 
> 
> Seems okay to me.  I doubt we have a security problem, but I can easily
> imagine that the probes wouldn't work right.

Sorry for confusion, yes, that will not be a security issue, since kprobes
and uprobes can be used only by root user.

Thank you,

-- 
Masami Hiramatsu <mhiramat@kernel.org>

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [tip:x86/urgent] kprobes/x86: Prohibit probing on exception masking instructions
  2018-05-09 12:58 ` [PATCH 1/2] kprobes: x86: Prohibit probing on exception masking instructions Masami Hiramatsu
@ 2018-05-13 17:57   ` tip-bot for Masami Hiramatsu
  0 siblings, 0 replies; 9+ messages in thread
From: tip-bot for Masami Hiramatsu @ 2018-05-13 17:57 UTC (permalink / raw)
  To: linux-tip-commits
  Cc: hpa, ricardo.neri-calderon, oleg, davem, ast, yhs, bp, luto,
	tglx, rostedt, torvalds, linux-kernel, francis.deslauriers,
	mingo, mhiramat

Commit-ID:  ee6a7354a3629f9b65bc18dbe393503e9440d6f5
Gitweb:     https://git.kernel.org/tip/ee6a7354a3629f9b65bc18dbe393503e9440d6f5
Author:     Masami Hiramatsu <mhiramat@kernel.org>
AuthorDate: Wed, 9 May 2018 21:58:15 +0900
Committer:  Thomas Gleixner <tglx@linutronix.de>
CommitDate: Sun, 13 May 2018 19:52:55 +0200

kprobes/x86: Prohibit probing on exception masking instructions

Since MOV SS and POP SS instructions will delay the exceptions until the
next instruction is executed, single-stepping on it by kprobes must be
prohibited.

However, kprobes usually executes those instructions directly on trampoline
buffer (a.k.a. kprobe-booster), except for the kprobes which has
post_handler. Thus if kprobe user probes MOV SS with post_handler, it will
do single-stepping on the MOV SS.

This means it is safe that if it is used via ftrace or perf/bpf since those
don't use the post_handler.

Anyway, since the stack switching is a rare case, it is safer just
rejecting kprobes on such instructions.

Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Cc: Ricardo Neri <ricardo.neri-calderon@linux.intel.com>
Cc: Francis Deslauriers <francis.deslauriers@efficios.com>
Cc: Oleg Nesterov <oleg@redhat.com>
Cc: Alexei Starovoitov <ast@kernel.org>
Cc: Steven Rostedt <rostedt@goodmis.org>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: "H . Peter Anvin" <hpa@zytor.com>
Cc: Yonghong Song <yhs@fb.com>
Cc: Borislav Petkov <bp@suse.de>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: "David S . Miller" <davem@davemloft.net>
Link: https://lkml.kernel.org/r/152587069574.17316.3311695234863248641.stgit@devbox

---
 arch/x86/include/asm/insn.h    | 18 ++++++++++++++++++
 arch/x86/kernel/kprobes/core.c |  4 ++++
 2 files changed, 22 insertions(+)

diff --git a/arch/x86/include/asm/insn.h b/arch/x86/include/asm/insn.h
index b3e32b010ab1..c2c01f84df75 100644
--- a/arch/x86/include/asm/insn.h
+++ b/arch/x86/include/asm/insn.h
@@ -208,4 +208,22 @@ static inline int insn_offset_immediate(struct insn *insn)
 	return insn_offset_displacement(insn) + insn->displacement.nbytes;
 }
 
+#define POP_SS_OPCODE 0x1f
+#define MOV_SREG_OPCODE 0x8e
+
+/*
+ * Intel SDM Vol.3A 6.8.3 states;
+ * "Any single-step trap that would be delivered following the MOV to SS
+ * instruction or POP to SS instruction (because EFLAGS.TF is 1) is
+ * suppressed."
+ * This function returns true if @insn is MOV SS or POP SS. On these
+ * instructions, single stepping is suppressed.
+ */
+static inline int insn_masking_exception(struct insn *insn)
+{
+	return insn->opcode.bytes[0] == POP_SS_OPCODE ||
+		(insn->opcode.bytes[0] == MOV_SREG_OPCODE &&
+		 X86_MODRM_REG(insn->modrm.bytes[0]) == 2);
+}
+
 #endif /* _ASM_X86_INSN_H */
diff --git a/arch/x86/kernel/kprobes/core.c b/arch/x86/kernel/kprobes/core.c
index 0715f827607c..6f4d42377fe5 100644
--- a/arch/x86/kernel/kprobes/core.c
+++ b/arch/x86/kernel/kprobes/core.c
@@ -370,6 +370,10 @@ int __copy_instruction(u8 *dest, u8 *src, u8 *real, struct insn *insn)
 	if (insn->opcode.bytes[0] == BREAKPOINT_INSTRUCTION)
 		return 0;
 
+	/* We should not singlestep on the exception masking instructions */
+	if (insn_masking_exception(insn))
+		return 0;
+
 #ifdef CONFIG_X86_64
 	/* Only x86_64 has RIP relative instructions */
 	if (insn_rip_relative(insn)) {

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [tip:x86/urgent] uprobes/x86: Prohibit probing on MOV SS instruction
  2018-05-09 12:58 ` [PATCH 2/2] uprobes: x86: Prohibit probing on MOV SS instruction Masami Hiramatsu
  2018-05-09 16:39   ` Oleg Nesterov
@ 2018-05-13 17:58   ` tip-bot for Masami Hiramatsu
  1 sibling, 0 replies; 9+ messages in thread
From: tip-bot for Masami Hiramatsu @ 2018-05-13 17:58 UTC (permalink / raw)
  To: linux-tip-commits
  Cc: mhiramat, yhs, torvalds, bp, luto, ricardo.neri-calderon,
	linux-kernel, oleg, mingo, francis.deslauriers, rostedt, ast,
	hpa, tglx, davem

Commit-ID:  13ebe18c94f5b0665c01ae7fad2717ae959f4212
Gitweb:     https://git.kernel.org/tip/13ebe18c94f5b0665c01ae7fad2717ae959f4212
Author:     Masami Hiramatsu <mhiramat@kernel.org>
AuthorDate: Wed, 9 May 2018 21:58:45 +0900
Committer:  Thomas Gleixner <tglx@linutronix.de>
CommitDate: Sun, 13 May 2018 19:52:56 +0200

uprobes/x86: Prohibit probing on MOV SS instruction

Since MOV SS and POP SS instructions will delay the exceptions until the
next instruction is executed, single-stepping on it by uprobes must be
prohibited.

uprobe already rejects probing on POP SS (0x1f), but allows probing on MOV
SS (0x8e and reg == 2).  This checks the target instruction and if it is
MOV SS or POP SS, returns -ENOTSUPP to reject probing.

Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Acked-by: Oleg Nesterov <oleg@redhat.com>
Cc: Ricardo Neri <ricardo.neri-calderon@linux.intel.com>
Cc: Francis Deslauriers <francis.deslauriers@efficios.com>
Cc: Alexei Starovoitov <ast@kernel.org>
Cc: Steven Rostedt <rostedt@goodmis.org>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: "H . Peter Anvin" <hpa@zytor.com>
Cc: Yonghong Song <yhs@fb.com>
Cc: Borislav Petkov <bp@suse.de>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: "David S . Miller" <davem@davemloft.net>
Link: https://lkml.kernel.org/r/152587072544.17316.5950935243917346341.stgit@devbox

---
 arch/x86/kernel/uprobes.c | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/arch/x86/kernel/uprobes.c b/arch/x86/kernel/uprobes.c
index 85c7ef23d99f..c84bb5396958 100644
--- a/arch/x86/kernel/uprobes.c
+++ b/arch/x86/kernel/uprobes.c
@@ -299,6 +299,10 @@ static int uprobe_init_insn(struct arch_uprobe *auprobe, struct insn *insn, bool
 	if (is_prefix_bad(insn))
 		return -ENOTSUPP;
 
+	/* We should not singlestep on the exception masking instructions */
+	if (insn_masking_exception(insn))
+		return -ENOTSUPP;
+
 	if (x86_64)
 		good_insns = good_insns_64;
 	else

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2018-05-13 17:59 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-05-09 12:57 [PATCH 0/2] uprobes: x86: Reject probing MOV SS Masami Hiramatsu
2018-05-09 12:58 ` [PATCH 1/2] kprobes: x86: Prohibit probing on exception masking instructions Masami Hiramatsu
2018-05-13 17:57   ` [tip:x86/urgent] kprobes/x86: " tip-bot for Masami Hiramatsu
2018-05-09 12:58 ` [PATCH 2/2] uprobes: x86: Prohibit probing on MOV SS instruction Masami Hiramatsu
2018-05-09 16:39   ` Oleg Nesterov
2018-05-13 17:58   ` [tip:x86/urgent] uprobes/x86: " tip-bot for Masami Hiramatsu
2018-05-09 13:01 ` [PATCH 0/2] uprobes: kprobes: x86: Reject probing MOV SS/POP SS Masami Hiramatsu
2018-05-09 14:36 ` [PATCH 0/2] uprobes: x86: Reject probing MOV SS Andy Lutomirski
2018-05-09 22:25   ` Masami Hiramatsu

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.