Adding a threat model should be pretty straight forward for this repository, and should follow the KVM threat model (is there such a thing generally available? ping @bonzini).
Since this is just a proxy repository that forwards calls to KVM, we should talk about:
- who is calling the ioctls (is it trusted/untrusted)
- ioctls input
- ioctls output
Another interesting thing is to call out the unsafe function and use of raw pointers as these might lead to undefined behaviors.
Adding a threat model should be pretty straight forward for this repository, and should follow the KVM threat model (is there such a thing generally available? ping @bonzini).
Since this is just a proxy repository that forwards calls to KVM, we should talk about:
Another interesting thing is to call out the unsafe function and use of raw pointers as these might lead to undefined behaviors.