[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87e17024-755d-e195-d9ea-ef62a4de6aa8@intel.com>
Date: Mon, 21 Nov 2022 15:46:35 -0800
From: Dave Hansen <dave.hansen@...el.com>
To: Kai Huang <kai.huang@...el.com>, linux-kernel@...r.kernel.org,
kvm@...r.kernel.org
Cc: linux-mm@...ck.org, seanjc@...gle.com, pbonzini@...hat.com,
dan.j.williams@...el.com, rafael.j.wysocki@...el.com,
kirill.shutemov@...ux.intel.com, ying.huang@...el.com,
reinette.chatre@...el.com, len.brown@...el.com,
tony.luck@...el.com, peterz@...radead.org, ak@...ux.intel.com,
isaku.yamahata@...el.com, chao.gao@...el.com,
sathyanarayanan.kuppuswamy@...ux.intel.com, bagasdotme@...il.com,
sagis@...gle.com, imammedo@...hat.com
Subject: Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not
enabled
On 11/20/22 16:26, Kai Huang wrote:
> The MMIO/xAPIC interface has some problems, most notably the APIC LEAK
> [1]. This bug allows an attacker to use the APIC MMIO interface to
> extract data from the SGX enclave.
>
> TDX is not immune from this either. Early check X2APIC and disable TDX
> if X2APIC is not enabled, and make INTEL_TDX_HOST depend on X86_X2APIC.
This makes no sense.
This is TDX host code. TDX hosts are untrusted. Zero of the TDX
security guarantees are provided by the host.
What is the benefit of disabling TDX from the host if x2APIC is not
enabled? It can't be for security reasons since the host does not help
provide TDX security guarantees. It also can't be for SGX because SGX
doesn't depend on the OS doing anything in order to be secure.
So, this boils down to the most fundamental of questions you need to
answer about every patch:
What does this code do?
What end-user-visible effect is there if this code is not present?
Powered by blists - more mailing lists