[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- To: "Christopherson,, Sean" <seanjc@xxxxxxxxxx>
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Date: Thu, 25 May 2023 19:16:43 +0000
- Accept-language: en-US
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=g5JJbQpzk9KTIUfEMKg72HvNldEktM/APqNazebbZT0=; b=UoittoKY3opRk4VKtyWXy/jq0C9+o3Grakzg1R4wSXfb2Ukc+9AMzVILcRZX8qTuRZzSN81jFphHbkfbUY5dZdLb9piXp7FVSgQ7ald/Js1hqMnMA4mMC3mQiu1KERLif+9B+Dn1GBzzDjNqLhvwnoMKcKd9dUW8CaefHplHz0WMrVTR6T79ZZTyJqI9A888LCttX8DAWQwcPbgTBv+vcRtvKqG3WcjlRLYBIn4AEpB+xW4F9X/2eahhBFYD/7daO2kZ5jdw72Je/iMOT4ro85Nr2rFepNvHB65C2q7eFNrZiy/GY0yyZNUNxVPHNuonbLEE2flRK4ThXXoQTR+KOQ==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jKU6aNgj0C6xM8XHCUStPmJZ+KZnb6hqWomyDUvkB6Y3x7z5WeFKyxIx75ib7tsbKFOYcbG58nkP8YveicRNwKXwe028iqdXfOdK+U25qnkEbbcUgwRwrh470Zpkl+mzBUbLhzPBJyiWv2nfba277YGvgaIErGUanT38FI0TJWUllYk+QeChMzRjvFLTmSLW18fXWCZnZxFCLW4mQFt1D3+E8mlnlkGF8kTM5x7t1YnK3dZeIP57kigf44gYzOdA4xK1CA556HEkvXKMgJspwvsMmjKB9QIlRpmK+34P6wUM8DzE4t8p73cap3RqUiEKJUFVbpNr7cKxVtLbNRyuwQ==
- Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com;
- Cc: "ssicleru@xxxxxxxxxxxxxxx" <ssicleru@xxxxxxxxxxxxxxx>, "tglx@xxxxxxxxxxxxx" <tglx@xxxxxxxxxxxxx>, "mic@xxxxxxxxxxx" <mic@xxxxxxxxxxx>, "marian.c.rotariu@xxxxxxxxx" <marian.c.rotariu@xxxxxxxxx>, "kvm@xxxxxxxxxxxxxxx" <kvm@xxxxxxxxxxxxxxx>, "virtualization@xxxxxxxxxxxxxxxxxxxxxxxxxx" <virtualization@xxxxxxxxxxxxxxxxxxxxxxxxxx>, "pbonzini@xxxxxxxxxx" <pbonzini@xxxxxxxxxx>, "qemu-devel@xxxxxxxxxx" <qemu-devel@xxxxxxxxxx>, "tgopinath@xxxxxxxxxxxxx" <tgopinath@xxxxxxxxxxxxx>, "linux-kernel@xxxxxxxxxxxxxxx" <linux-kernel@xxxxxxxxxxxxxxx>, "liran.alon@xxxxxxxxxx" <liran.alon@xxxxxxxxxx>, "ztarkhani@xxxxxxxxxxxxx" <ztarkhani@xxxxxxxxxxxxx>, "mdontu@xxxxxxxxxxxxxxx" <mdontu@xxxxxxxxxxxxxxx>, "x86@xxxxxxxxxx" <x86@xxxxxxxxxx>, "bp@xxxxxxxxx" <bp@xxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, "jamorris@xxxxxxxxxxxxxxxxxxx" <jamorris@xxxxxxxxxxxxxxxxxxx>, "vkuznets@xxxxxxxxxx" <vkuznets@xxxxxxxxxx>, "Andersen, John S" <john.s.andersen@xxxxxxxxx>, "nicu.citu@xxxxxxxxxx" <nicu.citu@xxxxxxxxxx>, "keescook@xxxxxxxxxxxx" <keescook@xxxxxxxxxxxx>, "Graf, Alexander" <graf@xxxxxxxxxx>, "wanpengli@xxxxxxxxxxx" <wanpengli@xxxxxxxxxxx>, "dev@xxxxxxxxxxxxxxxxxxxxxxxxx" <dev@xxxxxxxxxxxxxxxxxxxxxxxxx>, "madvenka@xxxxxxxxxxxxxxxxxxx" <madvenka@xxxxxxxxxxxxxxxxxxx>, "mingo@xxxxxxxxxx" <mingo@xxxxxxxxxx>, "will@xxxxxxxxxx" <will@xxxxxxxxxx>, "linux-security-module@xxxxxxxxxxxxxxx" <linux-security-module@xxxxxxxxxxxxxxx>, "hpa@xxxxxxxxx" <hpa@xxxxxxxxx>, "yuanyu@xxxxxxxxxx" <yuanyu@xxxxxxxxxx>, "linux-hyperv@xxxxxxxxxxxxxxx" <linux-hyperv@xxxxxxxxxxxxxxx>, "linux-hardening@xxxxxxxxxxxxxxx" <linux-hardening@xxxxxxxxxxxxxxx>, "dave.hansen@xxxxxxxxxxxxxxx" <dave.hansen@xxxxxxxxxxxxxxx>
- Delivery-date: Thu, 25 May 2023 19:17:03 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
- Thread-index: AQHZf2Ve5xw6RDm4tUGLnlOpizAoCa9qHQcAgAEGdICAAB9/gIAABBoAgAA1AQA=
- Thread-topic: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
On Thu, 2023-05-25 at 09:07 -0700, Sean Christopherson wrote:
> On Thu, May 25, 2023, Rick P Edgecombe wrote:
> > I wonder if it might be a good idea to POC the guest side before
> > settling on the KVM interface. Then you can also look at the whole
> > thing and judge how much usage it would get for the different
> > options
> > of restrictions.
>
> As I said earlier[*], IMO the control plane logic needs to live in
> host userspace.
> I think any attempt to have KVM providen anything but the low level
> plumbing will
> suffer the same fate as CR4 pinning and XO memory. Iterating on an
> imperfect
> solution to incremently improve security is far, far easier to do in
> userspace,
> and far more likely to get merged.
>
> [*] https://lore.kernel.org/all/ZFUyhPuhtMbYdJ76@xxxxxxxxxx
Sure, I should have put it more generally. I just meant people are not
going to want to maintain host-based features that guests can't
effectively use.
My takeaway from the CR pinning was that the guest kernel integration
was surprisingly tricky due to the one-way nature of the interface. XO
was more flexible than CR pinning in that respect, because the guest
could turn it off (and indeed, in the XO kernel text patches it had to
do this a lot).
|