Skip to content

Add OPENHCL_CONFIDENTIAL_DEBUG to manifest#1627

Merged
stunes-ms merged 1 commit into
microsoft:mainfrom
stunes-ms:user/mikestunes/snp-confidential-debug
Jun 30, 2025
Merged

Add OPENHCL_CONFIDENTIAL_DEBUG to manifest#1627
stunes-ms merged 1 commit into
microsoft:mainfrom
stunes-ms:user/mikestunes/snp-confidential-debug

Conversation

@stunes-ms
Copy link
Copy Markdown
Contributor

PR #1501 modified igvmfilegen to no longer explicitly add OPENHCL_CONFIDENTIAL_DEBUG to the static command line if debug is enabled. This broke SNP: SNP cannot yet directly read the debug bit, and the vmbus relay depends on trusting the host for now. This change adds OPENHCL_CONFIDENTIAL_DEBUG to the static command line explicitly in the meantime (except for TDX, because it can directly read the debug bit).

@stunes-ms stunes-ms requested a review from a team as a code owner June 30, 2025 18:57
@stunes-ms stunes-ms merged commit 01d7560 into microsoft:main Jun 30, 2025
28 checks passed
stunes-ms added a commit that referenced this pull request Jul 2, 2025
Release backport of PR #1501 and PR #1627.

If the debug bit is set in the VM's TDX attributes, the host can be
trusted. This change gets the TD report in the boot shim and checks the
debug bit. If it's set, parse the dynamic command line to allow
enabling, e.g., confidential debugging.

Note that microsoft/OHCL-Linux-Kernel#79 will
need to be resolved before hardware debug can be disabled in the
manifest.
@stunes-ms stunes-ms linked an issue Jul 9, 2025 that may be closed by this pull request
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Support dynamic command line & debug tracing with attested measurement

2 participants