Article 5CA59 Bottomley: Deploying Encrypted Images for Confidential Computing

Bottomley: Deploying Encrypted Images for Confidential Computing

by
corbet
from LWN.net on (#5CA59)
James Bottomley has posted adetailed description of what it takes to get an encrypted image runningsecurely with AMD's SEV mechanism. "In this post I'll discuss howyou actually bring up a confidential VM from an encrypted image whilepreserving secrecy. However, first a warning: This post represents thestate of the art and includes patches that are certainly not deployed indistributions and may not even be upstream, so if you want to follow alongat home you'll need to patch things like qemu, grub and OVMF."
External Content
Source RSS or Atom Feed
Feed Location http://lwn.net/headlines/rss
Feed Title LWN.net
Feed Link https://lwn.net/
Reply 0 comments