diff options
| author | Carlos Bilbao <[email protected]> | 2023-09-14 11:20:46 -0500 |
|---|---|---|
| committer | Jonathan Corbet <[email protected]> | 2023-09-23 01:14:21 -0600 |
| commit | 1f597b1a6ec28f848fc236f17f246c4cac7aa8cc (patch) | |
| tree | c0a39c3f128cb2a4c7ef4cbc1082d3dfceac4230 /tools/perf/scripts/python/bin/task-analyzer-record | |
| parent | 42b37783e2f6f806d4d5cd7e44d1b9016d93e5d9 (diff) | |
docs: security: Confidential computing intro and threat model for x86 virtualization
Kernel developers working on confidential computing for virtualized
environments in x86 operate under a set of assumptions regarding the Linux
kernel threat model that differs from the traditional view. Historically,
the Linux threat model acknowledges attackers residing in userspace, as
well as a limited set of external attackers that are able to interact with
the kernel through networking or limited HW-specific exposed interfaces
(e.g. USB, thunderbolt). The goal of this document is to explain additional
attack vectors that arise in the virtualized confidential computing space.
Reviewed-by: Larry Dewey <[email protected]>
Reviewed-by: David Kaplan <[email protected]>
Co-developed-by: Elena Reshetova <[email protected]>
Signed-off-by: Elena Reshetova <[email protected]>
Signed-off-by: Carlos Bilbao <[email protected]>
Message-ID: <[email protected]>
Signed-off-by: Jonathan Corbet <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/bin/task-analyzer-record')
0 files changed, 0 insertions, 0 deletions