[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Design session "AMD SEV"
Notes from the session: Andrei: is there ongoing work? Jürgen: similar to Intel TDX Andrei: guest memory encrypted, unavailable to the hypervisor; useful in cloud market; some similar feature on ARM too there was a session in April(?); possibly some funds will be available; several related features, can be done in stages; Andrew: first step: run XTF as minimal guest, PoC; then PVH guest Andrei: implemented by AMD PSP (pltform security processor), visible as separate PCI device; run the driver inside Xen hypervisor; QEMU already supports it, but cannot be reused in Xen there will be impact for Xen ABI, like passing hypercall parameters maybe possible to share effort with other architectures (ARM, Intel TDX) George: using physical addresses in hypercalls might be a good idea anyway, but the change is painful start with policy for new hypercalls only Jan: flag at hypercall entry if physical or virtual addresses (bit in hypercall number?) alternatively, mark buffer addresses in some high bit Jürgen: when adding SEV on Xen to Linux, it automatically will be supported for non-SEV too Jan: may be easier for hypercall callers to switch not all at once; for example /dev/xen/privcmd may be harder Jürgen: can dom0 run as SEV? Andrei: in principle yes, at some point; can also encrypt hypervisor memory Jan: dmop is a way to avoid privcmd with virtual addresses Jürgen: PVH dom0 wants physical addresses anyway grant tables needs to set unencrypted bit; alternatively bounce buffers (KVM way?) virtio may be easier, as KVM already supports SEV (with qemu-based backends) Marek: how to share PSP between Xen and dom0? Jan: interface coordinated by Xen Andrei: we ask community to help the efforts George: create epic, with specific tasks, some are shared with other goals some may be delegated to GSoc or similar efforts Roger: minimal PSP driver in Xen can be tested without rest of SEV support Jan: ^ especially when dom0 needs to access the interface anyway Jürgen: coordinate Linux work with me incremental work, starting with design review George: does anybody work on physical addresses in hypercalls? Jürgen: there was a design session about that before Jan: design in some people's heads Jürgen: will look how hard it would be to switch all at once per domain; uuuh, it could be hard, because domain may boot via grub George: lets write down those concerns -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab Attachment:
signature.asc
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |