KVM: x86/emulator: Fix handing of POP SS to correctly set interruptibility
authorMichal Luczaj <mhal@rbox.co>
Sun, 21 Aug 2022 22:06:47 +0000 (00:06 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 26 Oct 2022 10:34:33 +0000 (12:34 +0200)
commit379de01906eb60356a4f9b6d66735d33add9d9dc
treee2e889aea2a0e831b7fabf4b4cd5c6e1f77b22dd
parente3e5baa368798be702285ddc6ece4eaf57237378
KVM: x86/emulator: Fix handing of POP SS to correctly set interruptibility

commit 6aa5c47c351b22c21205c87977c84809cd015fcf upstream.

The emulator checks the wrong variable while setting the CPU
interruptibility state, the target segment is embedded in the instruction
opcode, not the ModR/M register.  Fix the condition.

Signed-off-by: Michal Luczaj <mhal@rbox.co>
Fixes: a5457e7bcf9a ("KVM: emulate: POP SS triggers a MOV SS shadow too")
Cc: stable@vger.kernel.org
Link: https://lore.kernel.org/all/20220821215900.1419215-1-mhal@rbox.co
Signed-off-by: Sean Christopherson <seanjc@google.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/kvm/emulate.c