From: "Relph, Richard" <richard.relph@amd.com>
To: "Jörg Rödel" <joro@8bytes.org>, "Gerd Hoffmann" <kraxel@redhat.com>
Cc: coconut-svsm@lists.linux.dev, linux-coco@lists.linux.dev
Subject: Re: SVSM Development Call July 2nd, 2025
Date: Mon, 7 Jul 2025 08:50:24 -0500 [thread overview]
Message-ID: <4b862033-9c53-47ec-8eae-e9c9ce7d7d7d@amd.com> (raw)
In-Reply-To: <4qbnbdno6hof3llfemhxc4prm7x2vzpqmvjknykelucpqhyryz@kbgpmaoy7vmz>
On 7/4/2025 11:39 AM, Jörg Rödel wrote:
>
> Hi Gerd,
>
> On Fri, Jul 04, 2025 at 12:36:07PM +0200, Gerd Hoffmann wrote:
>> On Fri, Jul 04, 2025 at 10:12:03AM +0200, Jörg Rödel wrote:
>>> Meeting minutes are now posted:
>>>
>>> https://github.com/coconut-svsm/governance/pull/65
>>
>> <quote>
>> SVSM deciding its memory needs and informing OVMF. Peter Fang started
>> exploring this, but it's not trivial and will take time to establish a
>> good protocol for memory consumption and handoff.
>> </quote>
>>
>> What exactly we are talking about? In the call alot of the discussion
>> centered around tracking the state of pages, and it wasn't totally clear
>> whenever that was an independent discussion or not ...
>>
>> From OVMF perspective I don't see this as a big problem, assuming we are
>> talking about static allocation. The memory discovery code is designed
>> around e820. Typically OVMF simply loads the e820 table from qemu via
>> fw_cfg. But there are multiple ways to get the memory map, when running
>> on xen or cloud hypervisor things are handled in a different way.
>> Adding one more option for svsm surely is possible.
>
> The idea is that COCONUT provides an IGVM memory map to OVMF, which takes it as
> a base for its memory map instead of the E820 from FWCFG.
>
> Longer term it would be great to fully enable OVMF for IGVM, so that it can
> also consume some of the ACPI tables from there instead of FWCFG. But that is
> future stuff, what we need for now is the memory map.
As I heard it, the concern is that maintaining page state in SVSM (not OVMF)
will eventually require SVSM to have access to a dynamic amount of memory.
Right now, AFAIK, SVSM has no way to request memory from either the host or the
guest.
Richard
next prev parent reply other threads:[~2025-07-07 13:50 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-07-01 20:18 SVSM Development Call July 2nd, 2025 Jörg Rödel
2025-07-04 8:12 ` Jörg Rödel
2025-07-04 10:36 ` Gerd Hoffmann
2025-07-04 16:39 ` Jörg Rödel
2025-07-07 13:50 ` Relph, Richard [this message]
2025-07-08 14:12 ` Gerd Hoffmann
2025-07-08 15:12 ` Relph, Richard
2025-07-09 9:43 ` Gerd Hoffmann
2025-07-09 12:04 ` Relph, Richard
2025-07-10 4:32 ` [EXTERNAL] " Jon Lange
2025-07-11 13:30 ` Gerd Hoffmann
2025-07-11 17:24 ` Jon Lange
2025-07-14 10:49 ` Gerd Hoffmann
2025-07-14 16:18 ` Jon Lange
2025-07-15 15:07 ` Gerd Hoffmann
2025-07-15 17:18 ` Jon Lange
2025-07-09 12:02 ` Jörg Rödel
2025-07-09 12:20 ` Relph, Richard
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4b862033-9c53-47ec-8eae-e9c9ce7d7d7d@amd.com \
--to=richard.relph@amd.com \
--cc=coconut-svsm@lists.linux.dev \
--cc=joro@8bytes.org \
--cc=kraxel@redhat.com \
--cc=linux-coco@lists.linux.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox