Re: Immediate values
From: Mathieu Desnoyers
Date: Fri Sep 25 2009 - 03:40:22 EST
* Arjan van de Ven (arjan@xxxxxxxxxxxxx) wrote:
> On Thu, 24 Sep 2009 21:34:22 +0200
> Ingo Molnar <mingo@xxxxxxx> wrote:
>
[context for people CCed: see
http://lkml.org/lkml/2009/9/24/262]
> >
> > * H. Peter Anvin <hpa@xxxxxxxxx> wrote:
> >
> > > I would like to get an official ACK or NAK for this patching
> > > technique from inside Intel, and preferrably from AMD as well. If
> > > it does work as described it would provide a very clean way to do
> > > one-shot alternative functions, which probably would be higher
> > > value than immediate data values.
> >
> > Sounds tempting. Things like the CONFIG_SECURITY hookery could use it?
> >
> > But ... since it's patched under stopmachine, is there any reason why
> > this wouldnt work?
> >
>
> stopmachine is fine.
>
> more aggressive tricks are rather dicey.
>
> (cross modifying code that's being executed in ring 0 is ... not
> something CPU designers had in mind)
>
Then, following your advice, kprobes should be re-designed to do a
stop_machine around the int3 breakpoint insertion ? And gdb
should be stopping all threads of a target process before inserting a
breakpoint. Therefore, I do not seem to be the only one confused about
Intel statement on this issue.
Mathieu
> --
> Arjan van de Ven Intel Open Source Technology Centre
> For development, discussion and tips for power savings,
> visit http://www.lesswatts.org
--
Mathieu Desnoyers
OpenPGP key fingerprint: 8CD5 52C3 8E3C 4140 715F BA06 3F25 A8FE 3BAE 9A68
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/