All of lore.kernel.org
 help / color / mirror / Atom feed
* Design session "AMD SEV"
@ 2022-09-22 11:46 Marek Marczykowski-Górecki
  0 siblings, 0 replies; only message in thread
From: Marek Marczykowski-Górecki @ 2022-09-22 11:46 UTC (permalink / raw)
  To: xen-devel

[-- Attachment #1: Type: text/plain, Size: 2610 bytes --]

Notes from the session:

Andrei: is there ongoing work?
Jürgen: similar to Intel TDX
Andrei: guest memory encrypted, unavailable to the hypervisor; useful in cloud market; some similar feature on ARM too
        there was a session in April(?); possibly some funds will be available;
        several related features, can be done in stages;
Andrew: first step: run XTF as minimal guest, PoC; then PVH guest
Andrei: implemented by AMD PSP (pltform security processor), visible as separate PCI device;
        run the driver inside Xen hypervisor;
        QEMU already supports it, but cannot be reused in Xen
        there will be impact for Xen ABI, like passing hypercall parameters
        maybe possible to share effort with other architectures (ARM, Intel TDX)
George: using physical addresses in hypercalls might be a good idea anyway, but the change is painful
        start with policy for new hypercalls only
Jan:    flag at hypercall entry if physical or virtual addresses (bit in hypercall number?)
        alternatively, mark buffer addresses in some high bit
Jürgen: when adding SEV on Xen to Linux, it automatically will be supported for non-SEV too
Jan:    may be easier for hypercall callers to switch not all at once; for example /dev/xen/privcmd may be harder
Jürgen: can dom0 run as SEV?
Andrei: in principle yes, at some point; can also encrypt hypervisor memory
Jan:    dmop is a way to avoid privcmd with virtual addresses
Jürgen: PVH dom0 wants physical addresses anyway
        grant tables needs to set unencrypted bit; alternatively bounce buffers (KVM way?)
        virtio may be easier, as KVM already supports SEV (with qemu-based backends)
Marek:  how to share PSP between Xen and dom0?
Jan:    interface coordinated by Xen
Andrei: we ask community to help the efforts
George: create epic, with specific tasks, some are shared with other goals
        some may be delegated to GSoc or similar efforts
Roger:  minimal PSP driver in Xen can be tested without rest of SEV support
Jan:    ^ especially when dom0 needs to access the interface anyway
Jürgen: coordinate Linux work with me
        incremental work, starting with design review
George: does anybody work on physical addresses in hypercalls?
Jürgen: there was a design session about that before
Jan:    design in some people's heads
Jürgen: will look how hard it would be to switch all at once per domain; uuuh, it could be hard, because domain may boot via grub
George: lets write down those concerns


-- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 488 bytes --]

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2022-09-22 11:47 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-09-22 11:46 Design session "AMD SEV" Marek Marczykowski-Górecki

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.