From nobody Wed May 14 19:35:32 2025 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com Return-Path: Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by mx.zohomail.com with SMTPS id 1520529238515224.2678598666597; Thu, 8 Mar 2018 09:13:58 -0800 (PST) Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 6EEA567EA7; Thu, 8 Mar 2018 17:13:56 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 2D914189BD; Thu, 8 Mar 2018 17:13:56 +0000 (UTC) Received: from lists01.pubmisc.prod.ext.phx2.redhat.com (lists01.pubmisc.prod.ext.phx2.redhat.com [10.5.19.33]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id BF21B4CAB4; Thu, 8 Mar 2018 17:13:47 +0000 (UTC) Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) by lists01.pubmisc.prod.ext.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id w28HDe1M014210 for ; Thu, 8 Mar 2018 12:13:40 -0500 Received: by smtp.corp.redhat.com (Postfix) id 380195DD63; Thu, 8 Mar 2018 17:13:40 +0000 (UTC) Received: from mx1.redhat.com (ext-mx01.extmail.prod.ext.phx2.redhat.com [10.5.110.25]) by smtp.corp.redhat.com (Postfix) with ESMTPS id C5F955DD93; Thu, 8 Mar 2018 17:13:23 +0000 (UTC) Received: from NAM02-CY1-obe.outbound.protection.outlook.com (mail-cys01nam02on0043.outbound.protection.outlook.com [104.47.37.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id DFC227FEA6; Thu, 8 Mar 2018 17:12:42 +0000 (UTC) Received: from wsp141597wss.amd.com (165.204.78.1) by DM2PR12MB0156.namprd12.prod.outlook.com (2a01:111:e400:50ce::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.548.13; Thu, 8 Mar 2018 17:12:39 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=nr8zKpmMw6nuAIvhwDA3G+rnjZvEpBY/ttnZfCIO9oI=; b=UwXCK9nU1TdN/wBrk2Ga9oZY6f5BrbVZi65Mpuz3QkeViVdjt3GCrReLPjHB/0pms7BmounbXMlNLEtAt4GfsvPu8ZAEz9nuscY55/mDd+2bLYOOyil7dBNdMXJJ/C3igG3DnPlpw+8bxXQHp7s9jm41VWfPybFbWeFh3WvrIvM= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=brijesh.singh@amd.com; From: Brijesh Singh To: libvir-list@redhat.com Date: Thu, 8 Mar 2018 11:12:07 -0600 Message-Id: <20180308171208.54369-9-brijesh.singh@amd.com> In-Reply-To: <20180308171208.54369-1-brijesh.singh@amd.com> References: <20180308171208.54369-1-brijesh.singh@amd.com> MIME-Version: 1.0 X-Originating-IP: [165.204.78.1] X-ClientProxiedBy: BN6PR11CA0037.namprd11.prod.outlook.com (2603:10b6:404:4b::23) To DM2PR12MB0156.namprd12.prod.outlook.com (2a01:111:e400:50ce::19) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 80ef5285-42be-492b-d6f4-08d58517cc7a X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:DM2PR12MB0156; X-Microsoft-Exchange-Diagnostics: 1; DM2PR12MB0156; 3:0ZaaG/tl21iQQ/CrWUkGuchuPOo1EdNFtj+NT0Hr6fkdOxegXevpb61YWvrBcg8wm3ZND7ZWSGabYjRTfqcCbCDmPiV4gd/0Il854kV6lo9yUMSank0JjsE7Brk7+VjoqXg1Xc6tYMzwbnvhFAzLetBlkuN51UP9kDAEapiRgsBiY2QfpeIUKm+rhi2VWC+9H6aOZeYmOSYM4pADOgGLyZBSfXsjzosW2P2wwV24sNhL5gC0IG+Z/OWcvNMUDSVY; 25:rKWlNN113IjI1mdnm+GmCCjjulHpoaMcqLilY22g58vmvfSiLqsBZmcqOlmQ8pqOx3gL1nmB7iVxd6sGyLMIcZC9WY///gmXE3yJcED1uY8S5OvAoQqexIxEjTT631ARIA9cxFYIvcn6qdW+CnxHC2ktJCP9q+l2ss1pnzjRS1LpXRWw7fmpTaIZcxT1SNQI0t+foEsHKJCQPr5zJHgMNwqLooZM/ZV0q85U47TDqhDtNf0nGbFhqjpxeNMnd0A4QoHVLI1nFg/8aaEe3oPV0QHNwx7Z1xopeb7oOf4eGPY3W8V/TP4EROsZ9cJFM2SI/9Is/76YP2cfpQ51bQ7SZQ==; 31:WyfinxN5UMkcTTD98V6/KfbIjKZD/NeU+kiTZYsaMtrinhOtravC6VH/9ywluOH7MgYhUwwOzcaX8s5r/wl/ZlkjsMRUBF0ATO937EF7MtCNw12NSaAhtLgUruNCXYEQniY9KP5YKToTyxEEOGzHopyXKA40sLSyCDf97hxuif9rhX6chlys7B/J9bPAJNN6q50ggBcPhukuhC/iksXV6hmLShDX8a9ujpi6b5FFW7Y= X-MS-TrafficTypeDiagnostic: DM2PR12MB0156: X-Microsoft-Exchange-Diagnostics: 1; DM2PR12MB0156; 20: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; 4:RKo3DKE2DIE4mpJe46DwVUobDLflDWOIWy9Pa+nkFYMdIVSXI4dYA8QuS5QxknIze9t4CZOkck3Xv3ZN69v1qoTmAvgQH2gFcOXbBQAqkPBoE13FSqSN6HFUjdrtLe/3k5k5S1HPgGmNKtu5Rf5rrWhEHZgXQJdTEjI9RSiUWy2+95bIztQz3lk4RFp2PKe8swS8mf4nz914QBDlyHEql2W5ix9BRzT1NxlgWfOXzVG35BjuPoHaCylgc6rhtwh3ZjFkH5Gl3KiFxqYcffLUeBleYYxcRlaczslzAHb6NAHcsQ+VNbnpgkWF7yxm3x6L1QEdBxDAku8dZsG09yzSSezepc+yMg+oTcEala8GzvI= X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(192374486261705)(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040501)(2401047)(5005006)(8121501046)(10201501046)(93006095)(93001095)(3002001)(3231220)(944501244)(52105095)(6055026)(6041288)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(20161123558120)(20161123564045)(6072148)(201708071742011); SRVR:DM2PR12MB0156; BCL:0; PCL:0; RULEID:; SRVR:DM2PR12MB0156; X-Forefront-PRVS: 060503E79B X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(366004)(346002)(39860400002)(396003)(376002)(39380400002)(199004)(189003)(5660300001)(16526019)(16586007)(478600001)(3846002)(6116002)(7696005)(52116002)(51416003)(76176011)(6486002)(25786009)(4326008)(316002)(5890100001)(59450400001)(26005)(1076002)(54906003)(86362001)(186003)(386003)(6666003)(2361001)(106356001)(2351001)(53416004)(8676002)(81166006)(81156014)(50226002)(15650500001)(53936002)(2950100002)(6916009)(2906002)(97736004)(68736007)(66066001)(47776003)(305945005)(7736002)(8936002)(36756003)(50466002)(48376002)(105586002); DIR:OUT; SFP:1101; SCL:1; SRVR:DM2PR12MB0156; H:wsp141597wss.amd.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; Received-SPF: pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) client-ip=209.132.183.28; envelope-from=libvir-list-bounces@redhat.com; helo=mx1.redhat.com; Received-SPF: None (protection.outlook.com: amd.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; DM2PR12MB0156; 23:RVswki7e9wNuPzU8Ox204P67vv2sONDpNEhRS3o8e?= =?us-ascii?Q?TGYV7EnkqL/pwByQZmhjKuKCWBfqd03n/jD+B4sZ7Rsurbqst5ELlk9+tsQ8?= =?us-ascii?Q?b93alCs8mw7t3kgDtmCOAkrGUX78YgJoZQnQN/p7FCAfo4ixQDg4oYkGYCrR?= =?us-ascii?Q?DjKFieqR0fxAZp1USfW8d8IvmMYGz6o/76/nzQR2vjQshQVpw8JUjuite+7k?= =?us-ascii?Q?btxcP3e1VCopOzF5PIHIgjoOide3mg/D5p5cif5UmMPj/Zu3jPitvfutLNgm?= =?us-ascii?Q?nldBmRN17sKZ5yDlP2cfxK1TCYyG8zEaEhsiqmBLYMNzQhwdzai7PYGzcnxk?= =?us-ascii?Q?SbAgRK9+k5DUbEfyuQXF3niPicOMtEPNNF1HpU75EbYfzR43zN5CtCvEyxKM?= =?us-ascii?Q?9In9+gKAGfuJ0UvQTiuSqfOzEUgXhQZIRccCekuxo9Cjao62RriR85t6LTov?= =?us-ascii?Q?NlpH/wWOkTDcFaE5aEU3F71LorhInx7nZKG73yI22t8Fb0ff5d9qH5IhppZ1?= =?us-ascii?Q?Xl0Xq7ggy3XPceJa/uWLPZ92JKZVWYM9Sgb15cSwjGVZz/cyXvEPm1mrjhZE?= =?us-ascii?Q?9fFkTuY7XS6ud9DhM6AzaaKsXbAhmvvXFpGjpECXci63YrwU2zS6eLgNohEy?= =?us-ascii?Q?UborHL4Ap9IxvPI+Y4shqpizeeTDcnKo2m6pGLDXJWxVN/aXYkMqLx/CWxh4?= =?us-ascii?Q?FDxSu6WKZeSayepqGnZhq+YAXn4+SE4AZQqA3pJcLtUArZt6jxL1RYTfIf7w?= =?us-ascii?Q?G0hXqW5nkcnyTIxcbgMNQujAbgN4Anxpa1kFN1aO+NPen1YqeKlyd54QFio9?= =?us-ascii?Q?dMjqK+CoZ1dKpfvZ/sIycEIvj7s3KDzAr5Hm040CF+uPqAKPuTohJEt+WfpU?= =?us-ascii?Q?IZ4M3NWV9KZyD1stj/w4197FtOqi5dx7f1xi527NXLAPgqSz0IoDmR5AtRqC?= =?us-ascii?Q?dmlU/gtJJBGBhnveWx/6/XPm4xizh98PSG6TIc2NusnsKi4dU7yZVXBAJ5AL?= =?us-ascii?Q?BzITUn5CEJ+5uzFNX0S+2JuGzFi6RMrLd1LKTb3tPmoPcvpV8GD5RLESm8Go?= =?us-ascii?Q?yUqcUQ4bb1hpLQVo/7OTnPJvYt1Q8GfxmOnGZrvHYaesLZgBPNzdUbVm8PsA?= =?us-ascii?Q?vwbyIJG71pe3MlJ1s7oCUOD0XvLUD2KDYEQW9/JZSy/hOi+0yv3RYx7n5K7Y?= =?us-ascii?Q?5Yckq5zc0+OUT7SCNuXh0L9xo/95qPu55761gUUGHKQ0HrDF8mtMVMO3A0uB?= =?us-ascii?Q?yT4pptLBnQ9nNon2K/zRHiBQmUfutgiM4wVbK1Q?= X-Microsoft-Antispam-Message-Info: BuSXH/qVGu0F+GYT8aa3kNq7fCKEWif42cVASmE+ikiimfsrP0JLtOp9sfRCfVGtzUsGWsdScm2pcjMGPv4WiDT3evxkUgPBaGWGyXnyPGPadaZbgd3fi79ee5ffQWkbexbaIKt59oaZbFxry1nFxD+rKnxwRMIrTBPm64sNdh8Y+L/7irBzD2tehLjWbtBG X-Microsoft-Exchange-Diagnostics: 1; DM2PR12MB0156; 6:3UuFIATdIo9maDJe3PvoKf7F2zeMs60XP/l8HOvl+psTWU8toBXhb4CpPulp30yJeJyWft3+IhYa96VGaCG8D9D44zbka0VrOtwPUsCVQkR1JAgyR/fZivNGV7MjZwtj3A/2a+U/6N12Pyw5ntycxIt7An/hCdgl1YGfqpDUHhJeUVRQt7JmoZd7KuHLdRsffywOHTMGcNZG43sHbrvD5QjVwMeVGiy8sGpr8pjp9GWa1gLEvlLcGNMxYKh8bQFyvwMErgiOK43LaY0eHvw+HnTG9rn1XAMV852HOQ7psivKqXh9ifgQ4bGhG4sHSNFCS3mEtV2fAE/UMlJu7n61z+nvjtha+U85gHOCavVNous=; 5:tsx8OhGx5uLzGoOr0i2hBKf1mJp33HzZq+uAtVmPG5IfXzyzbUryHQmkSC1UD6XEAXU3rmTob4/x8Bjq4375rkI42CjKNfwE82OQetTdB8H025sGD12Zdhu95iHjaTB/E3hCe0AaHmGN9PXXw+ZfyjiyxY/ezOkBsk/9D5WQVw4=; 24:keAFdMLVLFGhp7YonFW63ZUKT0ZlJz4eSD3NVYDPOP3glxRXVKloAWKH5Fl6SqB/j/yYhPGe8vIeMyHi+huqBCqXOmcn3JV2hTITB7yZVbk=; 7:2DEpPnwpV4yCqSBKVU+ZkBkhFkW2sTfG3eUM1SnZevqxyGSvyQzvMMbNrSwnaa5LOM0HGlRZBzBfmAm0dX5VJah+fnNgO/6nzD/az4KyRA2VnSjgK4oesKpRXPSH9I2RxvsO/AQ9sWlGJYVGqrI755SbT3tDl8NSS8vZcwYCFFYLs4GWeJAeJq04Aje9r+h6ABj6g+/WJztqgucKlt3vxbUDer/f1YoDWppIF3kF3oc38H/fpS2pn/pc8WoU1c6a SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; DM2PR12MB0156; 20:jtRKq0gINWCNwsHJOAKaer5J6TUFDw3mVPcBO/3CDsiXbmmdq56pCsR/LSg5gX8cmNF1e3O5b0pZcYY8TqhMchkPqiCjW47n2tEhL5Nkjk1g0rNxi2z3zEh/wzqx0XzWR2FxOn0kuQoomLwWR9qLDVC95prqKImxlT7o3BzRwhIcuOpucID6ek7iQ+lfR+squDHYnf90jeekdQSYliZWGNdOYs38UH+waygojcO2btazxE7KybVCeX9ToWXWHwcc X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2018 17:12:39.5700 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 80ef5285-42be-492b-d6f4-08d58517cc7a X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR12MB0156 X-Greylist: Sender passed SPF test, Sender IP whitelisted by DNSRBL, ACL 207 matched, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Thu, 08 Mar 2018 17:12:43 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Thu, 08 Mar 2018 17:12:43 +0000 (UTC) for IP:'104.47.37.43' DOMAIN:'mail-cys01nam02on0043.outbound.protection.outlook.com' HELO:'NAM02-CY1-obe.outbound.protection.outlook.com' FROM:'brijesh.singh@amd.com' RCPT:'' X-RedHat-Spam-Score: -0.011 (DKIM_SIGNED, DKIM_VALID, RCVD_IN_DNSWL_NONE, SPF_HELO_PASS) 104.47.37.43 mail-cys01nam02on0043.outbound.protection.outlook.com 104.47.37.43 mail-cys01nam02on0043.outbound.protection.outlook.com X-Scanned-By: MIMEDefang 2.83 on 10.5.110.25 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-loop: libvir-list@redhat.com Cc: Tom Lendacky , Peter Krempa , Xiaogang Chen , Jon Grimm , Brijesh Singh , Borislav Petkov Subject: [libvirt] [PATCH v2 8/9] virsh: implement new command for launch security X-BeenThere: libvir-list@redhat.com X-Mailman-Version: 2.1.12 Precedence: junk List-Id: Development discussions about the libvirt library & tools List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Transfer-Encoding: quoted-printable Sender: libvir-list-bounces@redhat.com Errors-To: libvir-list-bounces@redhat.com X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.38]); Thu, 08 Mar 2018 17:13:56 +0000 (UTC) X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZohoMail: RDKM_2 RSF_0 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" Add new 'launch-security' command, the command can be used to get or set the launch security information when booting encrypted VMs. Signed-off-by: Brijesh Singh --- tools/virsh-domain.c | 93 ++++++++++++++++++++++++++++++++++++++++++++++++= ++++ 1 file changed, 93 insertions(+) diff --git a/tools/virsh-domain.c b/tools/virsh-domain.c index 29bc8e6db18b..556dbca8e877 100644 --- a/tools/virsh-domain.c +++ b/tools/virsh-domain.c @@ -13872,6 +13872,93 @@ cmdDomFSInfo(vshControl *ctl, const vshCmd *cmd) return ret >=3D 0; } =20 +/* + * "launch-security" command + */ +static const vshCmdInfo info_launch_security[] =3D { + {.name =3D "help", + .data =3D N_("Get or set launch-security information") + }, + {.name =3D "desc", + .data =3D N_("Get or set the current launch-security information f= or a guest" + " domain.\n" + " To get the launch-security information use followi= ng command: \n\n" + " virsh # launch-security ") + }, + {.name =3D NULL} +}; + +static const vshCmdOptDef opts_launch_security[] =3D { + VIRSH_COMMON_OPT_DOMAIN_FULL(0), + {.name =3D "get", + .type =3D VSH_OT_STRING, + .help =3D N_("Show the launch-security info") + }, + VIRSH_COMMON_OPT_DOMAIN_CONFIG, + VIRSH_COMMON_OPT_DOMAIN_LIVE, + VIRSH_COMMON_OPT_DOMAIN_CURRENT, + {.name =3D NULL} +}; + +static void +virshPrintLaunchSecurityInfo(vshControl *ctl, virTypedParameterPtr params, + int nparams) +{ + size_t i; + + for (i =3D 0; i < nparams; i++) { + if (params[i].type =3D=3D VIR_TYPED_PARAM_STRING) + vshPrintExtra(ctl, "%-15s: %s\n", params[i].field, params[i].v= alue.s); + } +} + +static bool +cmdLaunchSecurity(vshControl *ctl, const vshCmd *cmd) +{ + virDomainPtr dom; + int nparams =3D 0; + virTypedParameterPtr params =3D NULL; + bool ret =3D false; + unsigned int flags =3D VIR_DOMAIN_AFFECT_CURRENT; + bool current =3D vshCommandOptBool(cmd, "current"); + bool config =3D vshCommandOptBool(cmd, "config"); + bool live =3D vshCommandOptBool(cmd, "live"); + + VSH_EXCLUSIVE_OPTIONS_VAR(current, live); + VSH_EXCLUSIVE_OPTIONS_VAR(current, config); + + if (config) + flags |=3D VIR_DOMAIN_AFFECT_CONFIG; + if (live) + flags |=3D VIR_DOMAIN_AFFECT_LIVE; + + if (!(dom =3D virshCommandOptDomain(ctl, cmd, NULL))) + return false; + + /* get the number of parameters */ + if (virDomainGetLaunchSecurityInfo(dom, NULL, &nparams, flags) !=3D 0)= { + vshError(ctl, "%s", _("Unable to get launch security info")); + goto cleanup; + } + + /* now go get all the launch-security parameters */ + params =3D vshCalloc(ctl, nparams, sizeof(*params)); + + if (virDomainGetLaunchSecurityInfo(dom, params, &nparams, flags) !=3D = 0) { + vshError(ctl, "%s", _("Unable to get launch security info")); + goto cleanup; + } + + virshPrintLaunchSecurityInfo(ctl, params, nparams); + + ret =3D true; + cleanup: + virTypedParamsFree(params, nparams); + virshDomainFree(dom); + return ret; +} + + const vshCmdDef domManagementCmds[] =3D { {.name =3D "attach-device", .handler =3D cmdAttachDevice, @@ -14487,5 +14574,11 @@ const vshCmdDef domManagementCmds[] =3D { .info =3D info_domblkthreshold, .flags =3D 0 }, + {.name =3D "launch-security", + .handler =3D cmdLaunchSecurity, + .opts =3D opts_launch_security, + .info =3D info_launch_security, + .flags =3D 0 + }, {.name =3D NULL} }; --=20 2.14.3 -- libvir-list mailing list libvir-list@redhat.com https://www.redhat.com/mailman/listinfo/libvir-list