summaryrefslogtreecommitdiff
path: root/scripts
diff options
context:
space:
mode:
authorKirill A. Shutemov <kirill.shutemov@linux.intel.com>2023-12-04 11:31:41 +0300
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2023-12-13 18:45:02 +0100
commit239bff0171a86e1bafd7da03631d74df1dfec6f1 (patch)
treeb63bb658e9a4e3ae059618aefe30642e67e40915 /scripts
parent22ca647c8f880f21881e9b2d38070dc61196a39d (diff)
downloadlinux-239bff0171a86e1bafd7da03631d74df1dfec6f1.tar.gz
linux-239bff0171a86e1bafd7da03631d74df1dfec6f1.tar.bz2
linux-239bff0171a86e1bafd7da03631d74df1dfec6f1.zip
x86/tdx: Allow 32-bit emulation by default
[ upstream commit f4116bfc44621882556bbf70f5284fbf429a5cf6 ] 32-bit emulation was disabled on TDX to prevent a possible attack by a VMM injecting an interrupt on vector 0x80. Now that int80_emulation() has a check for external interrupts the limitation can be lifted. To distinguish software interrupts from external ones, int80_emulation() checks the APIC ISR bit relevant to the 0x80 vector. For software interrupts, this bit will be 0. On TDX, the VAPIC state (including ISR) is protected and cannot be manipulated by the VMM. The ISR bit is set by the microcode flow during the handling of posted interrupts. [ dhansen: more changelog tweaks ] Signed-off-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com> Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com> Reviewed-by: Thomas Gleixner <tglx@linutronix.de> Reviewed-by: Borislav Petkov (AMD) <bp@alien8.de> Cc: <stable@vger.kernel.org> # v6.0+ Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'scripts')
0 files changed, 0 insertions, 0 deletions