Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 539D5C54EED for ; Mon, 30 Jan 2023 12:01:12 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235593AbjA3MBK (ORCPT ); Mon, 30 Jan 2023 07:01:10 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58724 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229578AbjA3MBH (ORCPT ); Mon, 30 Jan 2023 07:01:07 -0500 Received: from wout5-smtp.messagingengine.com (wout5-smtp.messagingengine.com [64.147.123.21]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8B68F10C for ; Mon, 30 Jan 2023 04:01:02 -0800 (PST) Received: from compute6.internal (compute6.nyi.internal [10.202.2.47]) by mailout.west.internal (Postfix) with ESMTP id 2411E32002D8; Mon, 30 Jan 2023 07:00:57 -0500 (EST) Received: from mailfrontend1 ([10.202.2.162]) by compute6.internal (MEProxy); Mon, 30 Jan 2023 07:00:59 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=shutemov.name; h=cc:cc:content-type:date:date:from:from:in-reply-to :in-reply-to:message-id:mime-version:references:reply-to:sender :subject:subject:to:to; s=fm2; t=1675080056; x=1675166456; bh=TD MULWl8K42gFGxXXkhM9aDVobr1p0cNzN+gUZU3mzI=; b=a1RqhclrB/UVRDFaX/ ABUUVNlvRQblwffKWZGbAPAFWktuBCvNeLm/GCHrgnblaGoduh2SUOXHl5dZJ0po KDcUHSSq28Q16PKse5EzeZfaWTwkoA/Go8HVJqyX4DXmWgYQ3M6AtWb8gsP/y6Bv tV3Yn2lLyaogk62/SKjxMUD4IazMpcACNoPYPt8h/JW6FHzfuhMn+yUsHiSd4JGg 70P15/h0za9fOXvBfjK0Ljeb9MVPAldOIpu2lpY6PuDeXv5mR6EjoVqh/JJOjZRC bN87/M0Ubsh5/vhPvhKa1jgjvg76Z1DqlatZHaw+qRZqBW4qr9t0p6+H1W3rPGt2 OPlA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-type:date:date:feedback-id :feedback-id:from:from:in-reply-to:in-reply-to:message-id :mime-version:references:reply-to:sender:subject:subject:to:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm3; t=1675080056; x=1675166456; bh=TDMULWl8K42gFGxXXkhM9aDVobr1 p0cNzN+gUZU3mzI=; b=ctjHXfIO5Ph8xWu/paabAmHoAbptx7O8uCgIGXOgV0Ms o0xsHE4wQ+0Wt38i6PW2cviAgEAMUm/3ExG3TEQKhhRv3Fl+0ChKjbxVcfeEnoYV K7t+nE/+ayC+g6SM2wblCPWW2XGrLdFl4anFYk9qJOcFzECnGO38YmXO0pgIogw1 1GtthGCX8qIoTpLmodhDXl21g8V1lVMCaKFoaEf8YJD9GJRFMy4TT/xvy76Wv7TC gusxPqQgdj82tK8+KaBKQ8OJe/2MXuluZUQwVeUQXmD8aGffotu+uXadEvgK0su8 6P8xD/p0qAhaqYPbZ5pRJg2VjXK5w9t8ZYTlScwc1Q== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvhedrudefvddgfeeiucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne cujfgurhepfffhvfevuffkfhggtggujgesthdttddttddtvdenucfhrhhomhepfdfmihhr ihhllhcutedrucfuhhhuthgvmhhovhdfuceokhhirhhilhhlsehshhhuthgvmhhovhdrnh grmhgvqeenucggtffrrghtthgvrhhnpefhieeghfdtfeehtdeftdehgfehuddtvdeuheet tddtheejueekjeegueeivdektdenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmh epmhgrihhlfhhrohhmpehkihhrihhllhesshhhuhhtvghmohhvrdhnrghmvg X-ME-Proxy: Feedback-ID: ie3994620:Fastmail Received: by mail.messagingengine.com (Postfix) with ESMTPA; Mon, 30 Jan 2023 07:00:55 -0500 (EST) Received: by box.shutemov.name (Postfix, from userid 1000) id D9458104B96; Mon, 30 Jan 2023 15:00:52 +0300 (+03) Date: Mon, 30 Jan 2023 15:00:52 +0300 From: "Kirill A. Shutemov" To: Christophe de Dinechin Cc: "Reshetova, Elena" , Greg Kroah-Hartman , "Shishkin, Alexander" , "Shutemov, Kirill" , "Kuppuswamy, Sathyanarayanan" , "Kleen, Andi" , "Hansen, Dave" , Thomas Gleixner , Peter Zijlstra , "Wunner, Lukas" , Mika Westerberg , "Michael S. Tsirkin" , Jason Wang , "Poimboe, Josh" , "aarcange@redhat.com" , Cfir Cohen , Marc Orr , "jbachmann@google.com" , "pgonda@google.com" , "keescook@chromium.org" , James Morris , Michael Kelley , "Lange, Jon" , "linux-coco@lists.linux.dev" , Linux Kernel Mailing List Subject: Re: Linux guest kernel threat model for Confidential Computing Message-ID: <20230130120052.7wfb5i2vql5ibkso@box.shutemov.name> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jan 30, 2023 at 12:36:34PM +0100, Christophe de Dinechin wrote: > Is there for example anything that precludes TDX or SEV from executing > code in the bounce buffers? In TDX, attempt to fetch instructions from shared memory (i.e. bounce buffer) will cause #GP, only data fetch is allowed. Page table also cannot be placed there and will cause the same #GP. -- Kiryl Shutsemau / Kirill A. Shutemov