kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: James Bottomley <jejb@linux.ibm.com>
To: "Tom Lendacky" <thomas.lendacky@amd.com>,
	"Jörg Rödel" <jroedel@suse.de>,
	amd-sev-snp@lists.suse.com, linux-coco@lists.linux.dev,
	kvm@vger.kernel.org
Subject: Re: [ANNOUNCEMENT] COCONUT Secure VM Service Module for SEV-SNP
Date: Thu, 13 Apr 2023 12:57:38 -0400	[thread overview]
Message-ID: <5ab2bca5dab750cce82df5e28db5ebb8f657e3ed.camel@linux.ibm.com> (raw)
In-Reply-To: <bf7f82ab-3cd3-a5f6-74ec-270d3ca6c766@amd.com>

On Tue, 2023-04-11 at 14:57 -0500, Tom Lendacky wrote:
> On 3/21/23 04:29, Jörg Rödel wrote:
> > Hi,
> > 
> > We are happy to announce that last week our secure VM service
> > module (SVSM) went public on GitHub for everyone to try it out and
> > participate in its further development. It is dual-licensed under
> > the MIT and APACHE-2.0 licenses.
> > 
> > The project is written in Rust and can be cloned from:
> > 
> >         https://github.com/coconut-svsm/svsm
> > 
> > There are also repositories in the github project with the Linux
> > host and guest, EDK2 and QEMU changes needed to run the SVSM and
> > boot up a full Linux guest.
> > 
> > The SVSM repository contains an installation guide in the
> > INSTALL.md file and contributor hints in CONTRIBUTING.md.
> > 
> > A blog entry with more details is here:
> > 
> >         https://www.suse.com/c/suse-open-sources-secure-vm-service-
> > module-for-confidential-computing/
> > 
> > We also thank AMD for implementing and providing the necessary
> > changes to Linux and EDK2 to make an SVSM possible.
> 
> Just wanted to let everyone know that I'm looking into what we can do
> to  move towards a single SVSM project so that resources aren't split
> between  the two.
> 
> I was hoping to have a comparison, questions and observations between
> the two available by now, however, I'm behind on that... but, I am
> working on it.

We (IBM) did look at what it might take to add a vTPM to Coconut, but
we ran into the problem that if we do it at CPL3 (which looks
desirable), then we have to wait until pretty much every one of the
twelve(!) tasks in this list is complete:

https://github.com/coconut-svsm/svsm/issues/16

At a conservative estimate, it looks like completion of all twelve
would take a team of people over a year to achieve.  Some of these
tasks, like task switching and a syscall interface, really don't look
like they belong in a simple service module, like we were imagining an
SVSM would operate, is there some rationale behind this (or ideally
some architecture document that gives the justifications)?  I think
what I'm really asking is can we get to CPL3 separation way sooner than
completion of all these tasks?

Regards,

James



  parent reply	other threads:[~2023-04-13 16:57 UTC|newest]

Thread overview: 42+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-03-21  9:29 [ANNOUNCEMENT] COCONUT Secure VM Service Module for SEV-SNP Jörg Rödel
2023-03-21 11:09 ` James Bottomley
2023-03-21 12:43   ` Jörg Rödel
2023-03-21 13:43     ` James Bottomley
2023-03-21 15:14       ` Jörg Rödel
2023-03-21 17:48         ` Dr. David Alan Gilbert
2023-03-21 18:50           ` Jörg Rödel
2023-03-21 20:05         ` James Bottomley
2023-03-22  1:29           ` Marc Orr
2023-03-22 17:57             ` Daniel P. Berrangé
2023-03-22  9:15           ` Jörg Rödel
2023-03-22 18:07             ` Daniel P. Berrangé
2023-03-22 18:24               ` Dionna Amalie Glaze
2023-03-21 15:06 ` Dr. David Alan Gilbert
2023-03-21 15:25   ` Jörg Rödel
2023-03-21 16:56     ` Dr. David Alan Gilbert
2023-03-21 19:03       ` Jörg Rödel
2023-03-21 19:53         ` Dr. David Alan Gilbert
2023-03-22  9:19           ` Jörg Rödel
2023-03-22  9:43             ` Alexander Graf
2023-03-22 10:34               ` Dr. David Alan Gilbert
2023-03-22 17:37                 ` Dionna Amalie Glaze
2023-03-22 17:47                   ` Dr. David Alan Gilbert
2023-03-22 21:53                     ` James Bottomley
2023-04-11 19:57 ` Tom Lendacky
2023-04-11 20:01   ` Dionna Amalie Glaze
2023-04-13 16:57   ` James Bottomley [this message]
2023-04-14  9:00     ` Jörg Rödel
2023-05-02 23:03 ` Tom Lendacky
2023-05-03 12:26   ` Jörg Rödel
2023-05-03 15:24     ` Dionna Amalie Glaze
2023-05-03 15:43       ` James Bottomley
2023-05-03 16:10       ` Daniel P. Berrangé
2023-05-03 16:51     ` Claudio Carvalho
2023-05-03 17:16       ` Alexander Graf
2023-05-05 15:34       ` Jörg Rödel
2023-05-05 15:47         ` Daniel P. Berrangé
2023-05-04 17:04     ` James Bottomley
2023-05-05 12:35       ` Christophe de Dinechin
2023-05-06 12:48         ` James Bottomley
2023-05-08  5:16           ` Alexander Graf
2023-05-05 15:02       ` Jörg Rödel

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=5ab2bca5dab750cce82df5e28db5ebb8f657e3ed.camel@linux.ibm.com \
    --to=jejb@linux.ibm.com \
    --cc=amd-sev-snp@lists.suse.com \
    --cc=jroedel@suse.de \
    --cc=kvm@vger.kernel.org \
    --cc=linux-coco@lists.linux.dev \
    --cc=thomas.lendacky@amd.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).