aboutsummaryrefslogtreecommitdiffstats
path: root/tools/perf/util/scripting-engines/trace-event-python.c
diff options
context:
space:
mode:
authorYu-cheng Yu <[email protected]>2020-02-04 17:14:24 +0000
committerBorislav Petkov <[email protected]>2020-03-26 11:21:40 +0000
commit5790921bc18b1eb5c0c61371e31114fd4c4b0154 (patch)
tree67083a6941278990e70abb71a8297c3baf7efaff /tools/perf/util/scripting-engines/trace-event-python.c
parentselftests/x86/ptrace_syscall_32: Fix no-vDSO segfault (diff)
downloadkernel-5790921bc18b1eb5c0c61371e31114fd4c4b0154.tar.gz
kernel-5790921bc18b1eb5c0c61371e31114fd4c4b0154.zip
x86/insn: Add Control-flow Enforcement (CET) instructions to the opcode map
Add the following CET instructions to the opcode map: INCSSP: Increment Shadow Stack pointer (SSP). RDSSP: Read SSP into a GPR. SAVEPREVSSP: Use "previous ssp" token at top of current Shadow Stack (SHSTK) to create a "restore token" on the previous (outgoing) SHSTK. RSTORSSP: Restore from a "restore token" to SSP. WRSS: Write to kernel-mode SHSTK (kernel-mode instruction). WRUSS: Write to user-mode SHSTK (kernel-mode instruction). SETSSBSY: Verify the "supervisor token" pointed by MSR_IA32_PL0_SSP, set the token busy, and set then Shadow Stack pointer(SSP) to the value of MSR_IA32_PL0_SSP. CLRSSBSY: Verify the "supervisor token" and clear its busy bit. ENDBR64/ENDBR32: Mark a valid 64/32 bit control transfer endpoint. Detailed information of CET instructions can be found in Intel Software Developer's Manual. Signed-off-by: Yu-cheng Yu <[email protected]> Signed-off-by: Borislav Petkov <[email protected]> Reviewed-by: Adrian Hunter <[email protected]> Reviewed-by: Tony Luck <[email protected]> Acked-by: Masami Hiramatsu <[email protected]> Link: https://lkml.kernel.org/r/[email protected]
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions