On Thu, 2023-05-25 at 09:07 -0700, Sean Christopherson wrote: > On Thu, May 25, 2023, Rick P Edgecombe wrote: > > I wonder if it might be a good idea to POC the guest side before > > settling on the KVM interface. Then you can also look at the whole > > thing and judge how much usage it would get for the different > > options > > of restrictions. > > As I said earlier[*], IMO the control plane logic needs to live in > host userspace. > I think any attempt to have KVM providen anything but the low level > plumbing will > suffer the same fate as CR4 pinning and XO memory. Iterating on an > imperfect > solution to incremently improve security is far, far easier to do in > userspace, > and far more likely to get merged. > > [*] https://lore.kernel.org/all/ZFUyhPuhtMbYdJ76@xxxxxxxxxx Sure, I should have put it more generally. I just meant people are not going to want to maintain host-based features that guests can't effectively use. My takeaway from the CR pinning was that the guest kernel integration was surprisingly tricky due to the one-way nature of the interface. XO was more flexible than CR pinning in that respect, because the guest could turn it off (and indeed, in the XO kernel text patches it had to do this a lot).