diff options
author | Michal Luczaj <mhal@rbox.co> | 2022-07-29 15:48:01 +0200 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2022-08-10 21:08:23 +0200 |
commit | 4ac5b4237793a6db791999edd53f0396c04053cd (patch) | |
tree | 461433f0ce837f6b255fdac1af359880a00ec5e1 /arch/x86/include | |
parent | KVM: X86: avoid uninitialized 'fault.async_page_fault' from fixed-up #PF (diff) | |
download | linux-4ac5b4237793a6db791999edd53f0396c04053cd.tar.xz linux-4ac5b4237793a6db791999edd53f0396c04053cd.zip |
KVM: x86: emulator: Fix illegal LEA handling
The emulator mishandles LEA with register source operand. Even though such
LEA is illegal, it can be encoded and fed to CPU. In which case real
hardware throws #UD. The emulator, instead, returns address of
x86_emulate_ctxt._regs. This info leak hurts host's kASLR.
Tell the decoder that illegal LEA is not to be emulated.
Signed-off-by: Michal Luczaj <mhal@rbox.co>
Message-Id: <20220729134801.1120-1-mhal@rbox.co>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'arch/x86/include')
0 files changed, 0 insertions, 0 deletions