From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pf1-f201.google.com (mail-pf1-f201.google.com [209.85.210.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 027306FC7 for ; Wed, 26 Apr 2023 21:33:08 +0000 (UTC) Received: by mail-pf1-f201.google.com with SMTP id d2e1a72fcca58-63b54cd223dso8506979b3a.1 for ; Wed, 26 Apr 2023 14:33:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1682544788; x=1685136788; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=Q6gblr+rFHKZD7TQERahHneNEtjZ/bNSKQPsJJcCZzo=; b=64Yxcr1gv5G1ETQLzD3H47rDdo9llnuvTFEaz75CzsReyyURjw7U8DWGnhmfXVvgtZ YyjiJSDUQj2A/nCNiitga4A5xU3qn7GA8HHODEzZFqstJ6xPwdWcKfVPsA/8yP6Gai8v pqcDFk3HITVbGtpz6z6qskA9c4AfU1GVXBltqvK+7jsS8ezrnFSS9gYo/v+NwdF1wU8q 6U+Mkl74emXIw3FxE0fq6KRi66kPzgnHmDMcnbf6+jP8x37zNl+zx4xo8JHU/F2bf/vX 1pzG/Na/2k6qt2JrHeWhVVSdK2MdhHAKZnc/Tm6KiWNw9es1T3MVQDxRUmKKfvKG8PfG yl6g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682544788; x=1685136788; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=Q6gblr+rFHKZD7TQERahHneNEtjZ/bNSKQPsJJcCZzo=; b=XEWjhku0lJcM9oRZ5YoTzn/D68oPeECATpe+covTIj1sNmsZgMxomW17/0EYDJqbJh BgbB8TBTyDjqGDK2xD3gDRk5yKX601cQ2c4jI7y5cS35oEJuvRA/r5oTMNEIdnnkftz9 BKdRLDLX79bSy4MWRUik3aexgcEBkhmnUVN49CMsuI9YKOLzI0Y8JsKINwhElRvjjdPp 55xUvG3uyjLZIKOM1i6nDE0C+Pi75MnMqva9I8T3A5xd3xnBCB1IBhQ+z6Toe598836+ 4y+rdhQu6eNpb+M1VrP2NoWDGh3K/WKAQk7BwmNIio97sgF3zKVWs2nI7PWwy8u0s7uQ ig+Q== X-Gm-Message-State: AAQBX9exTYHkHTaGr41gTNvLgFwavcKepAVZgda6ZLL/+HAE0RXVavmR di3qYL8FpbHxb6obpsfb/PfPw9v1Kg0= X-Google-Smtp-Source: AKy350Ywg746UTmjxVc3lRngXV/2GRWirJY3Wo6T7fLxvcZc5uWOilbZIUGF50vH2Wq5XgJ7IPSdZv2Jrbc= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a05:6a00:134b:b0:63d:5dcd:bc06 with SMTP id k11-20020a056a00134b00b0063d5dcdbc06mr8678577pfu.5.1682544788341; Wed, 26 Apr 2023 14:33:08 -0700 (PDT) Date: Wed, 26 Apr 2023 14:33:06 -0700 In-Reply-To: <04383d21-b71e-93dd-5f4c-b39f5bc21937@amd.com> Precedence: bulk X-Mailing-List: linux-coco@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20230327141816.2648615-1-carlos.bilbao@amd.com> <9fa5ce43-584d-878d-227a-fb458254c00a@amd.com> <9021d861-cde6-a51a-7d8c-b3f67eaa01d8@amd.com> <04383d21-b71e-93dd-5f4c-b39f5bc21937@amd.com> Message-ID: Subject: Re: [PATCH] docs: security: Confidential computing intro and threat model From: Sean Christopherson To: Carlos Bilbao Cc: Elena Reshetova , "corbet@lwn.net" , "linux-doc@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "ardb@kernel.org" , "kraxel@redhat.com" , "dovmurik@linux.ibm.com" , "dave.hansen@linux.intel.com" , "Dhaval.Giani@amd.com" , "michael.day@amd.com" , "pavankumar.paluri@amd.com" , "David.Kaplan@amd.com" , "Reshma.Lal@amd.com" , "Jeremy.Powell@amd.com" , "sathyanarayanan.kuppuswamy@linux.intel.com" , "alexander.shishkin@linux.intel.com" , "thomas.lendacky@amd.com" , "tglx@linutronix.de" , "dgilbert@redhat.com" , "gregkh@linuxfoundation.org" , "dinechin@redhat.com" , "linux-coco@lists.linux.dev" , "berrange@redhat.com" , "mst@redhat.com" , "tytso@mit.edu" , "jikos@kernel.org" , "joro@8bytes.org" , "leon@kernel.org" , "richard.weinberger@gmail.com" , "lukas@wunner.de" , "jejb@linux.ibm.com" , "cdupontd@redhat.com" , "jasowang@redhat.com" , "sameo@rivosinc.com" , "bp@alien8.de" , "security@kernel.org" , Andrew Bresticker , Rajnesh Kanwal , Dylan Reid , Ravi Sahita Content-Type: text/plain; charset="us-ascii" On Wed, Apr 26, 2023, Carlos Bilbao wrote: > On 4/26/23 2:53 PM, Sean Christopherson wrote: > > On Wed, Apr 26, 2023, Carlos Bilbao wrote: > >> On 4/26/23 10:51 AM, Sean Christopherson wrote: > >>> This document is named confidential-computing.rst, not tdx-and-snp.rst. Not > >>> explicitly mentioning SEV doesn't magically warp reality to make descriptions like > >>> this one from security/secrets/coco.rst disappear: > >>> > >>> Introduction > >>> ============ > >>> > >>> Confidential Computing (coco) hardware such as AMD SEV (Secure Encrypted > >>> Virtualization) allows guest owners to inject secrets into the VMs > >>> memory without the host/hypervisor being able to read them. > >>> > >>> My complaint about this document being too Intel/AMD centric isn't that it doesn't > >>> mention other implementations, it's that the doc describes CoCo purely from the > >>> narrow viewpoint of Intel TDX and AMD SNP, and to be blunt, reads like a press > >>> release and not an objective overview of CoCo. > >> > >> Be specific about the parts of the document that you feel are too > >> AMD/Intel centric, and we will correct them. > > > > The whole thing? There aren't specific parts that are too SNP/TDX centric, the > > entire tone and approach of the document is wrong. As I responded to Dave, I > > would feel differently if the document were named tdx-and-snp-threat-model.rst, > > but this patch proposes a generic confidential-computing.rst and presents the > > SNP+TDX confidential VM use case as if it's the *only* confidential computing use > > case. > > What part of us describing the current Linux kernel threat model or > defining basic concepts of confidential computing is SNP/TDX centric? > > IMHO, simply stating that "the whole thing" is wrong and that you don't > like the "tone", is not making a good enough case for us to change > anything, including the name of the document. I honestly don't know how to respond since you are either unable or unwilling to see the problems with naming a document "confidential computing" and then talking only about one very, very specific flavor of confidential computing as if that is the only flavor of confidential computing. So if you want to push this doc as is, please add my Nacked-by: Sean Christopherson