|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [RFC PATCH 00/16] Confidential computing and AMD SEV support
Le 16/05/2025 à 12:54, Jürgen Groß a écrit :
> On 16.05.25 11:31, Teddy Astie wrote:
>>
>> In order to create a confidential computing domain, the process is
>> follow :
>> - create a HVM/PVH domain with XEN_DOMCTL_CDF_coco
>> - populate initial memory as usual
>> - apply coco_prepare_initial_mem on all initial pages
>> (under SEV, this will encrypt memory)
>>
>> Under xl, it is exposed through the `coco` parameter ("coco = 1").
>
> Wouldn't it make sense to allow specifying the kind of domain
> (SEV, SEV-ES, SEV-SNP, TDX) like KVM does?
>
Yes, I was thinking of exposing it through in a optional arch-specific
parameter for specifying some SEV-specific parameters (enable SNP, ...).
And by default rely on what the platform provides with a "best default"
configuration.
(AFAICT it's not possible to have both SEV (AMD-specific) and TDX
(Intel-specific), or at least not yet)
> It might not be needed right now, but in future this could be needed
> (e.g. when allowing migration between hosts with different SEV
> features).
>
> I don't think this is important during RFC phase, but the final
> configuration and hypervisor interfaces of this series should allow
> that.
>
>
> Juergen
Teddy
Teddy Astie | Vates XCP-ng Developer
XCP-ng & Xen Orchestra - Vates solutions
web: https://vates.tech
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |