[tip: x86/cpu] x86/umip: Add emulation/spoofing for SLDT and STR instructions

2020-08-20 Thread tip-bot2 for Brendan Shanks
The following commit has been merged into the x86/cpu branch of tip: Commit-ID: b91e7089ae70d2f7c81a4456e5b78fef498663d9 Gitweb: https://git.kernel.org/tip/b91e7089ae70d2f7c81a4456e5b78fef498663d9 Author:Brendan Shanks AuthorDate:Fri, 10 Jul 2020 15:45:25 -07:00 Committer

[PATCH v5] x86/umip: Add emulation/spoofing for SLDT and STR instructions

2020-07-10 Thread Brendan Shanks
Add emulation/spoofing of SLDT and STR for both 32- and 64-bit processes. Wine users have found a small number of Windows apps using SLDT that were crashing when run on UMIP-enabled systems. Reported-by: Andreas Rammhold Originally-by: Ricardo Neri Signed-off-by: Brendan Shanks --- v5

[PATCH v4] x86/umip: Add emulation/spoofing for SLDT and STR instructions

2020-06-09 Thread Brendan Shanks
Add emulation/spoofing of SLDT and STR for both 32- and 64-bit processes. Wine users have found a small number of Windows apps using SLDT that were crashing when run on UMIP-enabled systems. Reported-by: Andreas Rammhold Originally-by: Ricardo Neri Signed-off-by: Brendan Shanks --- v4: Use

[PATCH v3] x86/umip: Add emulation/spoofing for SLDT and STR instructions

2020-06-08 Thread Brendan Shanks
Add emulation/spoofing of SLDT and STR for both 32- and 64-bit processes. Wine users have found a small number of Windows apps using SLDT that were crashing when run on UMIP-enabled systems. Reported-by: Andreas Rammhold Originally-by: Ricardo Neri Signed-off-by: Brendan Shanks --- v3: Use

Re: [PATCH v2] x86/umip: Add emulation/spoofing for SLDT and STR instructions

2020-06-08 Thread Brendan Shanks
> On Jun 8, 2020, at 2:53 PM, Ricardo Neri > wrote: > > On Mon, Jun 08, 2020 at 11:14:54AM -0700, Brendan Shanks wrote: >> Add emulation/spoofing of SLDT and STR for both 32- and 64-bit >> processes. >> >> Wine users have found a small number of Windows a

[PATCH v2] x86/umip: Add emulation/spoofing for SLDT and STR instructions

2020-06-08 Thread Brendan Shanks
Add emulation/spoofing of SLDT and STR for both 32- and 64-bit processes. Wine users have found a small number of Windows apps using SLDT that were crashing when run on UMIP-enabled systems. Reported-by: Andreas Rammhold Originally-by: Ricardo Neri Signed-off-by: Brendan Shanks --- v2

Re: [PATCH] x86/umip: Add emulation/spoofing for SLDT and STR instructions

2020-06-08 Thread Brendan Shanks
> On Jun 5, 2020, at 3:42 PM, Ricardo Neri > wrote: > > On Fri, Jun 05, 2020 at 11:58:13AM -0700, Brendan Shanks wrote: >> >>> On Jun 3, 2020, at 9:39 PM, Andy Lutomirski wrote: >>> >>> On Wed, Jun 3, 2020 at 5:12 PM Ricardo Neri >>> &g

[PATCH] x86/umip: Add emulation/spoofing for SLDT and STR instructions

2020-06-02 Thread Brendan Shanks
Add emulation/spoofing of SLDT and STR for both 32- and 64-bit processes. Wine users have found a small number of Windows apps using SLDT that were crashing when run on UMIP-enabled systems. Reported-by: Andreas Rammhold Originally-by: Ricardo Neri Signed-off-by: Brendan Shanks --- arch/x86

Re: [PATCH RFC] seccomp: Implement syscall isolation based on memory areas

2020-05-31 Thread Brendan Shanks
t; would need some care. Although if that’s running a BPF filter on every syscall, wouldn’t it also incur the ~10% overhead that Paul and Gabriel have seen with existing seccomp? Brendan Shanks CodeWeavers

Re: umip: AMD Ryzen 3900X, pagefault after emulate SLDT/SIDT instruction

2020-05-19 Thread Brendan Shanks
ll cases). https://www.winehq.org/pipermail/wine-devel/2020-February/160027.html In the meantime, an easy way to disable UMIP without rebuilding the kernel is to pass 'clearcpuid=514’ on the kernel command line. Brendan Shanks CodeWeavers

[tip: x86/asm] x86/umip: Add emulation (spoofing) for UMIP covered instructions in 64-bit processes as well

2019-09-10 Thread tip-bot2 for Brendan Shanks
The following commit has been merged into the x86/asm branch of tip: Commit-ID: e86c2c8b9380440bbe761b8e2f63ab6b04a45ac2 Gitweb: https://git.kernel.org/tip/e86c2c8b9380440bbe761b8e2f63ab6b04a45ac2 Author:Brendan Shanks AuthorDate:Thu, 05 Sep 2019 16:22:21 -07:00 Committer

Re: [PATCH] x86/umip: Add emulation for 64-bit processes

2019-09-09 Thread Brendan Shanks
> On Sep 7, 2019, at 2:26 PM, Ricardo Neri > wrote: > > On Thu, Sep 05, 2019 at 04:22:21PM -0700, Brendan Shanks wrote: >> >> if (umip_inst == UMIP_INST_SGDT || umip_inst == UMIP_INST_SIDT) { >> +u64 dummy_base_addr; >&

[PATCH] x86/umip: Add emulation for 64-bit processes

2019-09-05 Thread Brendan Shanks
Add emulation of the sgdt, sidt, and smsw instructions for 64-bit processes. Wine users have encountered a number of 64-bit Windows games that use these instructions (particularly sgdt), and were crashing when run on UMIP-enabled systems. Originally-by: Ricardo Neri Signed-off-by: Brendan