Re: [PATCH -tip v2 1/2] x86: xen: insn: Decode Xen and KVM emulate-prefix signature

2019-09-05 Thread Masami Hiramatsu
On Thu, 5 Sep 2019 20:13:50 -0500 Josh Poimboeuf wrote: > On Fri, Sep 06, 2019 at 09:50:19AM +0900, Masami Hiramatsu wrote: > > --- a/tools/objtool/sync-check.sh > > +++ b/tools/objtool/sync-check.sh > > @@ -4,6 +4,7 @@ > > FILES=' > > arch/x86/include/asm/inat_types.h > >

Re: [PATCH -tip v2 1/2] x86: xen: insn: Decode Xen and KVM emulate-prefix signature

2019-09-05 Thread Josh Poimboeuf
On Fri, Sep 06, 2019 at 09:50:19AM +0900, Masami Hiramatsu wrote: > --- a/tools/objtool/sync-check.sh > +++ b/tools/objtool/sync-check.sh > @@ -4,6 +4,7 @@ > FILES=' > arch/x86/include/asm/inat_types.h > arch/x86/include/asm/orc_types.h > +arch/x86/include/asm/xen/prefix.h >

[PATCH -tip v2 1/2] x86: xen: insn: Decode Xen and KVM emulate-prefix signature

2019-09-05 Thread Masami Hiramatsu
Decode Xen and KVM's emulate-prefix signature by x86 insn decoder. It is called "prefix" but actually not x86 instruction prefix, so this adds insn.emulate_prefix_size field instead of reusing insn.prefixes. If x86 decoder finds a special sequence of instructions of XEN_EMULATE_PREFIX and 'ud2a;