You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have found that RSD can execute illegal instruction in the commit 7b65f6b.
According to RISC-V Instruction Set Privileged Architecture, the funct3 of the load/store instruction should be from 000 to 110.
However, if the funct3 is set to 111, the RSD can still execute the instruction but Spike throws the illegal instruction exception.
For example, executing the instruction hex code 0x00817703 will cause Spike to throw the illegal instruction exception, but RSD executes it. Attach a hex file that can trigger this vulnerability.
Hi. I apologize for my late reply.
Thank you for reporting the bug.
As you pointed out, the instruction 7b65f6b should cause an invalid instruction exception, but RSD processes it as a valid instruction.
I will fix this bug soon.
Hi,
I have found that RSD can execute illegal instruction in the commit
7b65f6b
.According to RISC-V Instruction Set Privileged Architecture, the
funct3
of the load/store instruction should be from000
to110
.However, if the
funct3
is set to111
, the RSD can still execute the instruction but Spike throws the illegal instruction exception.For example, executing the instruction hex code
0x00817703
will cause Spike to throw the illegal instruction exception, but RSD executes it. Attach a hex file that can trigger this vulnerability.illegal_load.zip
The text was updated successfully, but these errors were encountered: