Merge tag 'sev_fixes_for_v6.6' of //git.kernel.org/pub/scm/linux/kernel/git/tip/tip
authorLinus Torvalds <torvalds@linux-foundation.org>
Fri, 20 Oct 2023 01:12:08 +0000 (18:12 -0700)
committerLinus Torvalds <torvalds@linux-foundation.org>
Fri, 20 Oct 2023 01:12:08 +0000 (18:12 -0700)
commit0df072ab65ef020091dc69c37c797f2650498472
treeb046cd6a2f35a32927e6e5be36557fbe51b6940d
parentce55c22ec8b223a90ff3e084d842f73cfba35588
parent63e44bc52047f182601e7817da969a105aa1f721
Merge tag 'sev_fixes_for_v6.6' of //git./linux/kernel/git/tip/tip

Pull x86 fixes from Borislav Petkov:
 "Take care of a race between when the #VC exception is raised and when
  the guest kernel gets to emulate certain instructions in SEV-{ES,SNP}
  guests by:

   - disabling emulation of MMIO instructions when coming from user mode

   - checking the IO permission bitmap before emulating IO instructions
     and verifying the memory operands of INS/OUTS insns"

* tag 'sev_fixes_for_v6.6' of //git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
  x86/sev: Check for user-space IOIO pointing to kernel space
  x86/sev: Check IOBM for IOIO exceptions from user-space
  x86/sev: Disable MMIO emulation from user mode
arch/x86/kernel/sev-shared.c
arch/x86/kernel/sev.c