Paolo Bonzini 4e15a0ddc3 KVM: SEV: snapshot the GHCB before accessing it
Validation of the GHCB is susceptible to time-of-check/time-of-use vulnerabilities.
To avoid them, we would like to always snapshot the fields that are read in
sev_es_validate_vmgexit(), and not use the GHCB anymore after it returns.

This means:

- invoking sev_es_sync_from_ghcb() before any GHCB access, including before
  sev_es_validate_vmgexit()

- snapshotting all fields including the valid bitmap and the sw_scratch field,
  which are currently not caching anywhere.

The valid bitmap is the first thing to be copied out of the GHCB; then,
further accesses will use the copy in svm->sev_es.

Fixes: 291bd20d5d88 ("KVM: SVM: Add initial support for a VMGEXIT VMEXIT")
Cc: stable@vger.kernel.org
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2023-08-04 13:33:06 -04:00
..
2023-06-28 20:35:21 -07:00
2023-07-06 10:06:04 -07:00
2023-07-06 10:06:04 -07:00
2023-07-23 10:44:38 -07:00
2023-07-01 21:12:32 -07:00
2023-06-28 20:35:21 -07:00
2023-07-22 10:46:30 -07:00
2023-07-06 10:06:04 -07:00
2023-07-06 10:06:04 -07:00
2023-06-29 16:34:12 -07:00
2023-07-09 10:02:49 -07:00
2023-06-29 16:34:12 -07:00
2023-07-12 16:28:53 -07:00
2023-07-22 10:46:30 -07:00
2023-07-14 11:14:07 -07:00
2023-07-23 10:44:38 -07:00
2023-07-13 13:34:00 -07:00