On Tue, Sep 05, 2023 at 10:26:56AM -0500, Carlos Bilbao wrote: > Kernel developers working on confidential computing for virtualized > environments in x86 operate under a set of assumptions regarding the Linux > kernel threat model that differs from the traditional view. Historically, > the Linux threat model acknowledges attackers residing in userspace, as > well as a limited set of external attackers that are able to interact with > the kernel through networking or limited HW-specific exposed interfaces > (e.g. USB, thunderbolt). The goal of this document is to explain additional > attack vectors that arise in the virtualized confidential computing space. > > Reviewed-by: Larry Dewey <larry.dewey@xxxxxxx> > Reviewed-by: David Kaplan <david.kaplan@xxxxxxx> > Co-developed-by: Elena Reshetova <elena.reshetova@xxxxxxxxx> > Signed-off-by: Elena Reshetova <elena.reshetova@xxxxxxxxx> > Signed-off-by: Carlos Bilbao <carlos.bilbao@xxxxxxx> > > --- > V3 can be found in: > https://lwn.net/Articles/937927/ That's not a lore.kernel.org link :)