From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail.8bytes.org (mail.8bytes.org [85.214.250.239]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 99194125B9 for ; Wed, 12 Mar 2025 11:44:19 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=85.214.250.239 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1741779861; cv=none; b=CmEs2j/iJKmEov4DLMt5O4aC140HcP1sSxak0SKwrE6oEquOM2KYNynRpRkXbBvuA/RlX9nPd1gFcglVS2Tl8GhGg3q0TkVznkDYsK8UpVYMIcgCnmW4BiOvjRf9+n+c2LJdwFoJ3rtYqiI/UqOFKNFXx6H0V65q9rw7NGRSJZc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1741779861; c=relaxed/simple; bh=ZFCKMFVYzNpv0Ew3/PBCQCLnP7czEt7QhS7DeQ/FVnA=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=pXi7nhT8hR1wEbYn8kj7s01Pppa2PGUK+S/p0SBkXzNHvw2w1LUhUr0M/QJKGulJdxyBiQ13No1pE24riQXiDDLyEQdMOH7ZH9sAEey2o4d2odGYvDn0dHPuGWYVCoZ9nh7OuXMGlXFkIbwW4As8JIbNMKtSnFJhdMuXFkdOh5U= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=8bytes.org; spf=pass smtp.mailfrom=8bytes.org; dkim=pass (2048-bit key) header.d=8bytes.org header.i=@8bytes.org header.b=wgy90SDO; arc=none smtp.client-ip=85.214.250.239 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=8bytes.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=8bytes.org Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=8bytes.org header.i=@8bytes.org header.b="wgy90SDO" Received: from 8bytes.org (p4ffe03ae.dip0.t-ipconnect.de [79.254.3.174]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mail.8bytes.org (Postfix) with ESMTPSA id 2F9D445400; Wed, 12 Mar 2025 12:44:18 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=8bytes.org; s=default; t=1741779858; bh=ZFCKMFVYzNpv0Ew3/PBCQCLnP7czEt7QhS7DeQ/FVnA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=wgy90SDOHbnwylACo48iC7a/GjY8Siktpl4WZtm43XqQV8AEKn7TCEXZT5a/p8NUC kyniPxTK/pzTXGElQA2LO7gprjHA+AMQPmyGnN0TKSLYSEFVKsPqOjblZONx+pvzmO BJ3APIceceMn7sdaBcB8nK58tsdn1WEDK0QKEG7cGMlPaMFlYeFrhM0q9bNSwkz0Bv AUnVLadqsDDdgBqxQ97EWBa7Oe4J3Mm1hK3ou+qd46nCHJ/IwijZjQLYaI11KXY0zw jKlX6hubXcz1NpMd/B/8cr54Epvy/3y35Mn1sbfc3j1Mkt74ryvmcGbH0ZO2D3hrFn sGkJCBkOMRu9w== Date: Wed, 12 Mar 2025 12:44:17 +0100 From: Joerg Roedel To: "Kirill A. Shutemov" Cc: Joerg Roedel , Alexey Gladkov , Borislav Petkov , =?iso-8859-1?Q?J=FCrgen_Gro=DF?= , "Alexey Gladkov (Intel)" , Dave Hansen , Ingo Molnar , x86@kernel.org, hpa@zytor.com, Tom Lendacky , Nikunj A Dadhania , linux-kernel@vger.kernel.org, Larry.Dewey@amd.com Subject: Re: [PATCH] x86/sev: Make SEV_STATUS available via SYSFS Message-ID: References: <29fa0d10-0d3d-47a0-8832-b2c7fc04f637@suse.com> <20250311110748.GCZ9AZhPYYAz-MXErv@fat_crate.local> <2eopafgnsx7pktqfqhu2nye44ib7ifz2cppqt7gunrltpxrnj6@i7jwe6jrun73> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <2eopafgnsx7pktqfqhu2nye44ib7ifz2cppqt7gunrltpxrnj6@i7jwe6jrun73> On Wed, Mar 12, 2025 at 12:59:50PM +0200, Kirill A. Shutemov wrote: > I am not sure I understand your point. > > In TDX case it is as trusted as the kernel itself. If the system is > attested, this info is going to accurate too as kernel gets information > from trusted TDX module. > > But nobody suggested to use this information to judge the security of the > system. Version information about the TDX module is required for the security evaluation at the verifier. The question is whether it makes sense to expose this information in an untrusted way in the guest (even alongside a trusted way), or if that makes tooling prefer the untrusted source because it is easier. The guest kernel is also only trusted after (runtime) verification. Regards, Joerg