Alioth supports booting confidential guests on the following platforms,
Important
Alioth confidential VMs should be used in testing environments only since the code base has not gone through any serious security reviews.
To launch an SEV guest,
-
build the stage0 firmware from Project Oak3,
-
prepare the guest Linux kernel and the initramfs,
-
launch the guest by
./alioth run -f /path/to/oak_stage0.bin \ --hypervisor kvm,dev_sev=/dev/sev \ --memory size=1G \ --num-cpu 2 \ --kernel /path/to/vmlinuz \ --cmd-line "console=ttyS0" \ --initramfs /path/to/initramfs \ --coco sev,policy=$POLICY
-
for SEV guests,
POLICY=0x1
, for SEV-ES guests,POLICY=0x5
, -
for SEV-SNP guests, pass
--coco snp,policy=0x30000
instead.
Note:
-
An SEV-SNP guest requires host Linux kernel 6.11.
-
Stage0 appends
-- --oak-dice=0x17000
to the guest kernel command line. Make sure the init process in the initramfs accepts or ignores this flag. If the init process fails to parse this flag and exits, the guest kernel would panic.