Masami Hiramatsu d60ad3d46f x86/kprobes: Retrieve correct opcode for group instruction
Since the opcodes start from 0xff are group5 instruction group which is
not 2 bytes opcode but the extended opcode determined by the MOD/RM byte.

The commit abd82e533d88 ("x86/kprobes: Do not decode opcode in resume_execution()")
used insn->opcode.bytes[1], but that is not correct. We have to refer
the insn->modrm.bytes[1] instead.

Fixes: abd82e533d88 ("x86/kprobes: Do not decode opcode in resume_execution()")
Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Link: https://lkml.kernel.org/r/161469872400.49483.18214724458034233166.stgit@devnote2
2021-03-23 16:07:55 +01:00
..
2021-03-15 11:26:40 +01:00
2020-11-19 11:43:17 +01:00
2020-11-24 16:47:49 +01:00
2020-11-20 17:43:15 +01:00
2021-02-24 16:32:23 -08:00
2021-02-21 13:31:43 -08:00
2021-03-15 11:46:40 +01:00
2020-08-20 13:12:58 +02:00
2020-06-11 15:54:31 -07:00
2020-07-27 14:31:07 -04:00
2021-03-15 12:00:18 +01:00
2020-02-16 20:58:06 +01:00
2020-09-10 11:19:29 +02:00
2020-08-04 14:47:45 -07:00