Re: [PATCH 0/2] Support userspace hypercalls for TDX

2024-07-05 Thread Tim Merrifield
On Thu, Jul 04, 2024 at 03:05:05PM +0200, Peter Zijlstra wrote: > And how are we to ascertain the software using these hooks is deemed > secure? What security risks are there for the kernel if a malicious > userspace process asks for these rights? > > The kernel must assume malice on the part of u

Re: [PATCH 0/2] Support userspace hypercalls for TDX

2024-07-05 Thread Tim Merrifield
Thanks for the response, Dave. On Wed, Jul 03, 2024 at 05:18:22PM -0700, Dave Hansen wrote: > > Could we please be frank and transparent about what you actually want > here and how you expect this mechanism to be used? > Sorry for being unclear. open-vm-tools is currently broken on TDX and the

Re: [PATCH 0/2] Support userspace hypercalls for TDX

2024-07-04 Thread Peter Zijlstra
On Wed, Jul 03, 2024 at 11:35:59PM +, Tim Merrifield wrote: > VMCALL and VMMCALL instructions are used by x86 guests to request services > from the host VMM. Both VMCALL and VMMCALL are not restricted to CPL 0. > This allows userspace software like open-vm-tools to communicate directly > with t

Re: [PATCH 0/2] Support userspace hypercalls for TDX

2024-07-03 Thread Dave Hansen
On 7/3/24 16:35, Tim Merrifield wrote: > VMCALL and VMMCALL instructions are used by x86 guests to request services > from the host VMM. Both VMCALL and VMMCALL are not restricted to CPL 0. > This allows userspace software like open-vm-tools to communicate directly > with the VMM. Could we please