x86/traps: Decode 0xEA instructions as #UD
authorPeter Zijlstra <peterz@infradead.org>
Mon, 24 Feb 2025 12:37:06 +0000 (13:37 +0100)
committerIngo Molnar <mingo@kernel.org>
Wed, 26 Feb 2025 11:22:10 +0000 (12:22 +0100)
commit2e044911be75ce3321c5b3d10205ac0b54f8cb92
tree9f0cbe22d1c848eff033384f51160c729ecf2fda
parent5d703825fde301677e8a79b0738927490407f435
x86/traps: Decode 0xEA instructions as #UD

FineIBT will start using 0xEA as #UD. Normally '0xEA' is a 'bad',
invalid instruction for the CPU.

Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Reviewed-by: Kees Cook <kees@kernel.org>
Link: https://lore.kernel.org/r/20250224124200.166774696@infradead.org
arch/x86/include/asm/bug.h
arch/x86/kernel/traps.c