On Tue, 23 Apr 2024 at 11:28, Gerd Hoffmann <kra...@redhat.com> wrote: > > On Fri, Apr 19, 2024 at 11:21:46AM -0700, Adam Dunlap wrote: > > Ensure that when a #VC exception happens, the instruction at the > > instruction pointer matches the instruction that is expected given the > > error code. This is to mitigate the ahoi WeSee attack [1] that could > > allow hypervisors to breach integrity and confidentiality of the > > firmware by maliciously injecting interrupts. This change is a > > translated version of a linux patch e3ef461af35a ("x86/sev: Harden #VC > > instruction emulation somewhat") > > > > [1] https://ahoi-attacks.github.io/wesee/ > > > > Cc: Borislav Petkov (AMD) <b...@alien8.de> > > Cc: Tom Lendacky <thomas.lenda...@amd.com> > > Signed-off-by: Adam Dunlap <acdun...@google.com> > > Reviewed-by: Gerd Hoffmann <kra...@redhat.com> >
Thanks all, I've merged this now. -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#118221): https://edk2.groups.io/g/devel/message/118221 Mute This Topic: https://groups.io/mt/105623545/21656 Mute #vc:https://edk2.groups.io/g/devel/mutehashtag/vc Group Owner: devel+ow...@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-