Re: [PATCH 3/5] x86/boot/compressed/64: Check SEV encryption in 64-bit boot-path
From: Joerg Roedel
Date: Tue Oct 20 2020 - 11:44:13 EST
On Tue, Oct 20, 2020 at 10:33:12AM -0400, Arvind Sankar wrote:
> That doesn't feel like a big loss: if a malicious hypervisor wanted to
> induce completely random code execution, it can do that anyway by just
> messing with the guest-to-host translation, no?
Yes, but relying on defined behavior is still better. Undefined behavior
could also mean it jumps to some other code which then leaks data.
Regards,
Joerg