On Fri, Apr 19, 2024 at 11:21:46AM -0700, Adam Dunlap wrote: > Ensure that when a #VC exception happens, the instruction at the > instruction pointer matches the instruction that is expected given the > error code. This is to mitigate the ahoi WeSee attack [1] that could > allow hypervisors to breach integrity and confidentiality of the > firmware by maliciously injecting interrupts. This change is a > translated version of a linux patch e3ef461af35a ("x86/sev: Harden #VC > instruction emulation somewhat") > > [1] https://ahoi-attacks.github.io/wesee/ > > Cc: Borislav Petkov (AMD) <b...@alien8.de> > Cc: Tom Lendacky <thomas.lenda...@amd.com> > Signed-off-by: Adam Dunlap <acdun...@google.com>
Reviewed-by: Gerd Hoffmann <kra...@redhat.com> take care, Gerd -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#118132): https://edk2.groups.io/g/devel/message/118132 Mute This Topic: https://groups.io/mt/105623545/21656 Mute #vc:https://edk2.groups.io/g/devel/mutehashtag/vc Group Owner: devel+ow...@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-