Masami Hiramatsu d60ad3d46f x86/kprobes: Retrieve correct opcode for group instruction
Since the opcodes start from 0xff are group5 instruction group which is
not 2 bytes opcode but the extended opcode determined by the MOD/RM byte.

The commit abd82e533d88 ("x86/kprobes: Do not decode opcode in resume_execution()")
used insn->opcode.bytes[1], but that is not correct. We have to refer
the insn->modrm.bytes[1] instead.

Fixes: abd82e533d88 ("x86/kprobes: Do not decode opcode in resume_execution()")
Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Link: https://lkml.kernel.org/r/161469872400.49483.18214724458034233166.stgit@devnote2
2021-03-23 16:07:55 +01:00
..
2021-02-27 08:29:02 -08:00
2021-03-14 13:33:33 -07:00
2021-03-14 12:35:02 -07:00
2021-02-28 12:06:45 -08:00
2021-02-27 08:29:02 -08:00
2021-02-27 08:29:02 -08:00
2021-02-27 08:29:02 -08:00
2021-02-27 08:29:02 -08:00
2021-02-27 08:29:02 -08:00
2021-02-27 08:29:02 -08:00
2021-02-27 08:29:02 -08:00
2021-02-27 08:29:02 -08:00