> 
> On Jun 4, 2020, at 2:03 PM, Jim Mattson <jmatt...@google.com> wrote:
> 
> On Thu, Jun 4, 2020 at 12:09 PM Nakajima, Jun <jun.nakaj...@intel.com> wrote:
> 
>> We (Intel virtualization team) are also working on a similar thing, 
>> prototyping to meet such requirements, i..e "some level of confidentiality 
>> to guests”. Linux/KVM is the host, and the Kirill’s patches are helpful when 
>> removing the mappings from the host to achieve memory isolation of a guest. 
>> But, it’s not easy to prove there are no other mappings.
>> 
>> To raise the level of security, our idea is to de-privilege the host kernel 
>> just to enforce memory isolation using EPT (Extended Page Table) that 
>> virtualizes guest (the host kernel in this case) physical memory; almost 
>> everything is passthrough. And the EPT for the host kernel excludes the 
>> memory for the guest(s) that has confidential info. So, the host kernel 
>> shouldn’t cause VM exits as long as it’s behaving well (CPUID still causes a 
>> VM exit, though).
> 
> You're Intel. Can't you just change the CPUID intercept from required
> to optional? It seems like this should be in the realm of a small
> microcode patch.

We’ll take a look. Probably it would be helpful even for the bare-metal kernel 
(e.g. debugging). 
Thanks for the suggestion.

--- 
Jun
Intel Open Source Technology Center


Reply via email to