Commit 1f597b1a authored by Carlos Bilbao's avatar Carlos Bilbao Committed by Jonathan Corbet

docs: security: Confidential computing intro and threat model for x86 virtualization

Kernel developers working on confidential computing for virtualized
environments in x86 operate under a set of assumptions regarding the Linux
kernel threat model that differs from the traditional view. Historically,
the Linux threat model acknowledges attackers residing in userspace, as
well as a limited set of external attackers that are able to interact with
the kernel through networking or limited HW-specific exposed interfaces
(e.g. USB, thunderbolt). The goal of this document is to explain additional
attack vectors that arise in the virtualized confidential computing space.
Reviewed-by: default avatarLarry Dewey <larry.dewey@amd.com>
Reviewed-by: default avatarDavid Kaplan <david.kaplan@amd.com>
Co-developed-by: default avatarElena Reshetova <elena.reshetova@intel.com>
Signed-off-by: default avatarElena Reshetova <elena.reshetova@intel.com>
Signed-off-by: default avatarCarlos Bilbao <carlos.bilbao@amd.com>

Message-ID: <98804f27-c2e7-74d6-d671-1eda927e19fe@amd.com>
Signed-off-by: default avatarJonathan Corbet <corbet@lwn.net>
parent 42b37783
......@@ -6,6 +6,7 @@ Security Documentation
:maxdepth: 1
credentials
snp-tdx-threat-model
IMA-templates
keys/index
lsm
......
This diff is collapsed.
......@@ -5196,6 +5196,12 @@ S: Orphan
W: http://accessrunner.sourceforge.net/
F: drivers/usb/atm/cxacru.c
CONFIDENTIAL COMPUTING THREAT MODEL FOR X86 VIRTUALIZATION (SNP/TDX)
M: Elena Reshetova <elena.reshetova@intel.com>
M: Carlos Bilbao <carlos.bilbao@amd.com>
S: Maintained
F: Documentation/security/snp-tdx-threat-model.rst
CONFIGFS
M: Joel Becker <jlbec@evilplan.org>
M: Christoph Hellwig <hch@lst.de>
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment