LAR, LSL, VERR, and VERW emulation involve calling protmode_load_seg()
with x86_seg_none. The fuzzer's read_segment() hook function has an
assertion which triggers in this case. Calling the hook function,
however, makes little sense for those insns, as there's no data to
retrieve. Instead zero-filling the output structure is what properly
corresponds to those insns being invoked with a NUL selector.
While there also add a related comment at the VERR/VERW call site.
Fixes: 06a3b8cd7ad2 ("x86emul: support LAR/LSL/VERR/VERW")
Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=70918
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Stefano Stabellini <stefano.stabellini@amd.com>
Acked-by: Andrew Cooper <andrew.cooper3@citrix.com>
case x86_seg_tr:
goto raise_exn;
}
- if ( !_amd_like(cp) || vcpu_has_nscb() || !ops->read_segment ||
+ if ( seg == x86_seg_none || !_amd_like(cp) || vcpu_has_nscb() ||
+ !ops->read_segment ||
ops->read_segment(seg, sreg, ctxt) != X86EMUL_OKAY )
memset(sreg, 0, sizeof(*sreg));
else
&sreg, ctxt, ops) )
{
case X86EMUL_OKAY:
- if ( sreg.s &&
+ if ( sreg.s /* Excludes NUL selectors too. */ &&
((modrm_reg & 1) ? ((sreg.type & 0xa) == 0x2)
: ((sreg.type & 0xa) != 0x8)) )
_regs.eflags |= X86_EFLAGS_ZF;