From nobody Wed May 14 19:39:50 2025 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com Return-Path: Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by mx.zohomail.com with SMTPS id 1522166235839920.4846446496788; Tue, 27 Mar 2018 08:57:15 -0700 (PDT) Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 221557D0D7; Tue, 27 Mar 2018 15:57:14 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id C72675D72B; Tue, 27 Mar 2018 15:57:13 +0000 (UTC) Received: from lists01.pubmisc.prod.ext.phx2.redhat.com (lists01.pubmisc.prod.ext.phx2.redhat.com [10.5.19.33]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id 6F6404CA9B; Tue, 27 Mar 2018 15:57:13 +0000 (UTC) Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) by lists01.pubmisc.prod.ext.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id w2RFtovm008746 for ; Tue, 27 Mar 2018 11:55:50 -0400 Received: by smtp.corp.redhat.com (Postfix) id 41E905D732; Tue, 27 Mar 2018 15:55:50 +0000 (UTC) Received: from mx1.redhat.com (ext-mx07.extmail.prod.ext.phx2.redhat.com [10.5.110.31]) by smtp.corp.redhat.com (Postfix) with ESMTPS id C5DAC5D961; Tue, 27 Mar 2018 15:55:47 +0000 (UTC) Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-bl2nam02on0082.outbound.protection.outlook.com [104.47.38.82]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 00524C04BE30; Tue, 27 Mar 2018 15:55:46 +0000 (UTC) Received: from wsp141597wss.amd.com (165.204.78.1) by BY2PR12MB0145.namprd12.prod.outlook.com (2a01:111:e400:585a::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.609.10; Tue, 27 Mar 2018 15:55:39 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=Yb3N1n9rVrdDBaNdJHo8rX3rpy6ladk/xdn/INTg7eI=; b=DDpxu509VxFPmQe3hyozEXg1muQowUrzJsWJ292esc2X+Pzaxo6NeATmrgONitEhCug3I3nlSBKOd0YgycHFE8CnrdJ3KHmdD6y5Iv/vmMxqCOvdoqlUNqB5DjrgJJC+4TAzw9USPqOkzaRtrZCPN8NTRPPWRKq/EYzdDs6Gtek= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=brijesh.singh@amd.com; From: Brijesh Singh To: libvir-list@redhat.com Date: Tue, 27 Mar 2018 10:55:08 -0500 Message-Id: <20180327155515.87611-3-brijesh.singh@amd.com> In-Reply-To: <20180327155515.87611-1-brijesh.singh@amd.com> References: <20180327155515.87611-1-brijesh.singh@amd.com> MIME-Version: 1.0 X-Originating-IP: [165.204.78.1] X-ClientProxiedBy: BN6PR17CA0008.namprd17.prod.outlook.com (2603:10b6:404:65::18) To BY2PR12MB0145.namprd12.prod.outlook.com (2a01:111:e400:585a::18) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: ced008eb-56e0-48aa-8a97-08d593fb30ca X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:BY2PR12MB0145; X-Microsoft-Exchange-Diagnostics: 1; BY2PR12MB0145; 3:A+1MmifxJ2WYo8B/6DBgFsciO4wrvDHuQrMk15u0kK9lV5ibqV4fGVwbxGMfU2q+VtoQQ2HCk2fc+r57jbWt6hXor9WLaFXcBkbVyF9SUmMXg4lVK35gFlCk+Vx1QyZ8Keez4EaUcwnWMulHz9NGvLPliT9NILPGPFGPgxMZNwYtdnrayR5UeyCAiUiTa6Y9S/PWqXO004wiVLOpOF4mWfaReGtPZ/GY06pbRrMaKPTJtGKsqKXVBPCIjWTCYwIJ; 25:zATZC5J28sUiITjzPwh6206uC6HAxI8S8iNY1dzKBQWDzZCtgnvEXV6woJnDK7/rvwQHW3BZt8LHtnGBszNUwRmwmeN2qsQnroNvawm7XYfANIfmH7w6txjW0HmJVVoLgQxkuGjHV0lDyRdVXB3aq8oRp5VGt4Y0RsBhvLw/JbnAdHeXbIrhe1Vf7XwKAj1kXqEdBB5YaYxsZU9uUBO3kctPD8BuEwqlfRqArWNzx4c3SXnB1Pt1aHMWisdH/pQ5iEIhUNOvWbkrloJZB51CV87H7+EaJ1L9W9g6HZ/yoKDAY8w9zEWUx/Ka5mQNYTAhi+O/TuhhWdu4oYFo4KXGLg==; 31:p/8FMQA9PfpEPvCW8njyVEqUJ+ylXpF5C0D73GaxW7Fji680fuymPKY1AKvbzCjEKDg8xaayTiB/8Sffkhqmsb4ODIm7YJdnPkL380Q1XVUUhvPWCOHaNpaMnClBGTwb2u0emF90RfRLkAnrSs/0Hjfaa0CH8T2poZXOpZUZm7PKfKobTMqCi+eBHgPytnQERCq+OEGjtmy/iY6pwK5nTQ+t6rpZOSga7ixtrhDHVOM= X-MS-TrafficTypeDiagnostic: BY2PR12MB0145: X-Microsoft-Exchange-Diagnostics: 1; BY2PR12MB0145; 20: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; 4:I6RfhUq09JLBiJ2fr8XmQUrPlG9qjkGpi93DLjBm+T7Am1+ccmJIQroCL8mWf3KhOvXk/vwxRCWpZV0LeBmr4OxBT0M6gp+HPdYlJZu5QW8RsoeIODKvMtsQ0DDoYqAWw6NRKs3NOzfp5QFtYZY5Ld/tinNaZFVzXF17+8yIlb3CGjzgjzEows11FujsrOwHL+PO3C9DwXZ6WdjXCUoSykuTWZIXZKuhAqR9ii91hLVxpk2BWOv/GqAHEHHMeR8eiE8fTUe4aU5hr7dXqryJHYm4ZwN98a1az/H7n8ZiptdcOVl9xtKWPMYVbP3dEwcp X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3002001)(10201501046)(3231221)(944501327)(52105095)(93006095)(93001095)(6055026)(6041310)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123564045)(20161123560045)(6072148)(201708071742011); SRVR:BY2PR12MB0145; BCL:0; PCL:0; RULEID:; SRVR:BY2PR12MB0145; X-Forefront-PRVS: 0624A2429E X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(376002)(39380400002)(39860400002)(346002)(396003)(366004)(189003)(199004)(2870700001)(97736004)(6666003)(4326008)(6916009)(8936002)(298455003)(50466002)(316002)(81166006)(50226002)(52116002)(23676004)(7696005)(53936002)(5660300001)(3846002)(16526019)(76176011)(186003)(36756003)(68736007)(486005)(956004)(25786009)(476003)(59450400001)(8676002)(6306002)(2616005)(6486002)(53416004)(106356001)(486005)(26005)(47776003)(66066001)(54906003)(7736002)(2361001)(1076002)(81156014)(6116002)(2906002)(2351001)(236005)(446003)(86362001)(11346002)(606006)(386003)(478600001)(105586002); DIR:OUT; SFP:1101; SCL:1; SRVR:BY2PR12MB0145; H:wsp141597wss.amd.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; Received-SPF: pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) client-ip=209.132.183.28; envelope-from=libvir-list-bounces@redhat.com; helo=mx1.redhat.com; Received-SPF: None (protection.outlook.com: amd.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCWTJQUjEyTUIwMTQ1OzIzOmRTeHJQOHpHYWc0cmpOTzM4eFFETkZsU2ZP?= =?utf-8?B?NUREMHl6eGlKYWl0WmlKSzRpS0kxU3lkL2plc2EzNXVSVVRKQXY2UU9EVExj?= =?utf-8?B?V3dBbm5OdE1KZHRTWUtsREo1em1CTG5kbWJvNzdLaUxwRC9QSU9nZmt1VHgy?= =?utf-8?B?REoray9kdFRocExDVXpaTWsrVCs0UDJDblpLN3RlSlZJVk5mazVacWwxMnpO?= =?utf-8?B?RWtHOUVyUmdOV1VKU2ZTSkV4ZlFvZTcrVzQ3eENiWTZkeVVpYUpLUms0b3Bo?= =?utf-8?B?QXJkYjdWMmxwS0I0MyttbDdBZkNQWkw0ajZ0SVovKzNyMllmbDZjdGVzRllw?= =?utf-8?B?VlREVE16RjlWemRlV2x5UkRqVXJvS1dCN3RCcUY2TmtrU1pwM0pWY3N1cXBv?= =?utf-8?B?M2NJQjViRWFPYXRqbjM5TGQzc0RaWnhZdTNYcnRLYzJaUDlESld5ai95b3ZQ?= =?utf-8?B?Y1JIRXpJc2N4SFNTcCs5bjIyd1Mzc2llNDVGNjh3SFplTUIyei96RTduSGxw?= =?utf-8?B?MTd1OWtNNG1lcFBRdXFWZzdmK1d2Q3hIQm5nc2FYOGxDM3VjTDVPNW9oK1pt?= =?utf-8?B?TXRVbkZjK0ZHejRIOVZEYk9EaEFRQ0FPSERTbS9YbGJJSmRRN0U3am15VnBx?= =?utf-8?B?eDlvYlFaOWFoSU9sS2RWQ25EUWtIWjdtem9HczFIMGt5NElkSTNXRm5kNy9F?= =?utf-8?B?WnFzTTgycTkvM0dNVzd3OUVlejJkOE5zYzRBTHRrdFZnN3ZzazVxSU15Wk9M?= =?utf-8?B?akQ5WHVlOXZ3WFdzY0NyaSt4NUp5KzNhenplT0h4aFF3cHQvN1pnSnREWG5p?= =?utf-8?B?eE5weW84MXN4SkNwYnQwZ2t0NHF5K3JuOEdzdHUzYzZWSjIrNGhwdkdUK1Bh?= =?utf-8?B?MFJ3a3MxUlU1dFNFOTQwc1B3ZjFFaVFsalRLREJVckJkV0V2emlrQ3YzNkZu?= =?utf-8?B?V2U0LzJxRCtOWHNPZnNzeWZ1S3k0SWtrb2JxZlAwMjlWV084N0Y4dWV4R2cv?= =?utf-8?B?UEFTZ25PV3c4UHdxc2pFT3hKQUtCVEJsT0J1K3F2Nm1JZ3NEZkErMEU4dm9W?= =?utf-8?B?U0VreGZpc1pHZVc3aHNKN2pwQlVTeHVPT0R4M2o1RWtCbDkybFpmNUUyR0Fw?= =?utf-8?B?eCtLSXRtak9rUXZnTkNjY1NZVnhCMVVabkpxZW44bTVhTUM5aGJqb1QwSDln?= =?utf-8?B?VlpxY2NlWUZ3cGQ1SzJrZVAwaFBRSHdWcmRBeXc0OWhiMDRrMjZldnlXeDk3?= =?utf-8?B?M3A0SkU5aW9JeUxwNVNZd2k2TTlxN2VxeDg3ZmZSQkJFVTFaQzFXbkhYODZy?= =?utf-8?B?bTdPbTVSQm9oRmhBYzlzd0Joc1RDZlZwZ1Z6TmZEbGJIdzNGdFpFOFZvYlhr?= =?utf-8?B?MVZubWdsS2N0ZmUzUWxzenV2b2tTaml3SElacVYwc1hteXd6bnRoMXFaUGcv?= =?utf-8?B?Y0VyTlhhMFl5aWtCbHU1VVgvenhIRlhKbjBEWWZCbjBJT2VIU1VsVTZpb1Fl?= =?utf-8?B?Q21VaGE1TWYrRVVYVU43T3pGb1U1YVZaQnFCZ20ydzdoTUxvaVdUbTVFZmY0?= =?utf-8?B?YVNTTUk3Z0ZYK2FZckFDenUvNHYyMDdMeVJDZ2RhQmNXRTBwc0lPNTR3emZC?= =?utf-8?B?RFB1dHQwdW5hNFhrVmt4R2JleXdkS0ZLN3lXYXJMaWxlV21SUkJKdUpMLzlS?= =?utf-8?B?WTRPbUNxL1o1eVc0NXk4dFdxMGJvellsaHBIOGtaTkJ3eDR5UmgyNWp2dDB6?= =?utf-8?B?S2lvMTFSemRFWTFXVzJGaVlxUGd5c04zN1o0TVBqZ2RJTW9lZ1hYdHJEdDB5?= =?utf-8?Q?hyctq3O3kaRAV?= X-Microsoft-Antispam-Message-Info: v1drQBJLEM9WYJrxzOc2a0UGA+d0mjcrS9u8HlzE/zAnMR15ySKvYS8q3v3g+PUWKljJ+0BnzXmFu25H+tNkX78W+ZBBQio1DKs3W/q8pmUCibMv2kaWWQ/5bhxXN+1TNw+7pUMdo1/PcYfQ6XqloYPmp68MtaSUH1gwOTYIhfaTzZobHAiC5UxBWBzZg4/7 X-Microsoft-Exchange-Diagnostics: 1; BY2PR12MB0145; 6:DOp+lMzsVZXaQphYl/oLnlWDgZkpRtFPIutfAM67putrxaoalbXm0cWf5tgcVpTaWy5JrjW8DVs+ajuTfg1KKjUq2zYkLebO6hlOjGDsnddunpRo/cyr6I3pKWZH6lfxbO3htHxzCGnPjO9yYAW8VHMr33oATd6/RBQIQsXFtGxPQjJoG9hT5F3U5RMQW9zdtVyb2SYEcVZKDWyX9UeMALTptAqalYoQQaux4wzN9r1yuRd/qoUKBzUVLjxhiT1gFaF9QXI+YTV//wBFmjv7QbrykJ+5roMPJrceIOQWaWMnKtOe7Yijh9B1IB6VjsUC6CKeuZThh8AthHpMyzxHN9dTLv6MxdoHFEPUJo15wmE9C7ab30RaQCnVLdLjU2SaI/AKYZa8KozGrdEtDzjuAAUKBT4bAWlss8jnD9gRXQ1FynMFr5Him0TFBlEgVtlcl5iDfDDE4avAwnspSxkQ4Q==; 5:J5qouCIdhdWwYZFSzqfluV9lXywv+k+BGqCwH8AQolR0Nwrkn+oS1Az5MV98sqP87ng9Pq05FSloUrdUS0r6y+Tj4VqPIVnBRTSaARcT6TN0LDd1fEZaAC2KcEWynQ4r0WBXLs0/zY2jTPm/7UK9PYYWtED+ZKUUtTHAgxqlWT4=; 24:TqE+sqQfxuW8JUc7g8JloArj1o3OPLDYOH+UBa1ZXKrefU7EC2VytwPZbNenESqjyp799f5Mu45pSJLKTyS71QxXqKR4fvZBB40G/IaOOt4= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BY2PR12MB0145; 7:fmYxTKydcP75IBslzvSe/JVPygEATBU1UrpuVSCR398GGg5sG5lMCK/o3KfowFBQQQ3TV59aSDAARUEIjz7gnWUmprJHbX7AGdbb9fzCHCyk+q0kzm8r5m4w+SVqMi8lI9NNobcjoFZ5iE4l9q1rP/rvERG9DQ4uSBClP/yVTwQn1cL4yeLn1QZauuSl3xOXJ8Er+ztPGuPYvq7/lHD5G9WM+0rWfS/8zHk5M7NiVbh8V72kZt8eJm+1ADNZimZC; 20:x4pBHdzPKf7ynR8prT2p/E00kOEGulmnAohpq+5n2cQm9gOwYYJIfG0ot0HayMVl9esIrSv5dT9ipo4SXlq3RpORR97/u9uUxAbyQDU8wwhxj/mcUrJG8ZjCS6SREkQc3A8Z6K14GggQPyy9o+gFRx22UM/B3gPVQckftSyA0aVKoqH/bFuan2KY6DY37BSmmjXjCM5AEqxYYyG81+YeBk0d00J5Q9goOv6whutlafZRFirpyWaaZhb10nLxSR/+ X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 27 Mar 2018 15:55:39.3072 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: ced008eb-56e0-48aa-8a97-08d593fb30ca X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2PR12MB0145 X-Greylist: Sender passed SPF test, Sender IP whitelisted by DNSRBL, ACL 207 matched, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Tue, 27 Mar 2018 15:55:46 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Tue, 27 Mar 2018 15:55:46 +0000 (UTC) for IP:'104.47.38.82' DOMAIN:'mail-bl2nam02on0082.outbound.protection.outlook.com' HELO:'NAM02-BL2-obe.outbound.protection.outlook.com' FROM:'brijesh.singh@amd.com' RCPT:'' X-RedHat-Spam-Score: -0.011 (DKIM_SIGNED, DKIM_VALID, RCVD_IN_DNSWL_NONE, SPF_HELO_PASS) 104.47.38.82 mail-bl2nam02on0082.outbound.protection.outlook.com 104.47.38.82 mail-bl2nam02on0082.outbound.protection.outlook.com X-Scanned-By: MIMEDefang 2.78 on 10.5.110.31 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-loop: libvir-list@redhat.com Cc: Tom Lendacky , Peter Krempa , Xiaogang Chen , Jon Grimm , Andrea Bolognani , Brijesh Singh , Borislav Petkov Subject: [libvirt] [PATCH v4 2/9] qemu: introduce SEV feature in hypervisor capabilities X-BeenThere: libvir-list@redhat.com X-Mailman-Version: 2.1.12 Precedence: junk List-Id: Development discussions about the libvirt library & tools List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Sender: libvir-list-bounces@redhat.com Errors-To: libvir-list-bounces@redhat.com X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Tue, 27 Mar 2018 15:57:14 +0000 (UTC) X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZohoMail: RDKM_2 RSF_0 Z_629925259 SPT_0 Extend hypervisor capabilities to include sev feature. When available, hypervisor supports launching an encrypted VM on AMD platform. The sev feature tag provides additional details like platform diffie-hellman key and certificate chain which can be used by the guest owner to establish a cryptographic session with the SEV firmware to negotiate keys used for attestation or to provide secret during launch. Reviewed-by: "Daniel P. Berrang=C3=A9" Signed-off-by: Brijesh Singh --- docs/formatdomaincaps.html.in | 40 ++++++++++++++++++++++++++++++++++++++= ++ docs/schemas/domaincaps.rng | 20 ++++++++++++++++++++ src/conf/domain_capabilities.c | 20 ++++++++++++++++++++ src/conf/domain_capabilities.h | 1 + src/qemu/qemu_capabilities.c | 2 ++ 5 files changed, 83 insertions(+) diff --git a/docs/formatdomaincaps.html.in b/docs/formatdomaincaps.html.in index 6bfcaf6..f383141 100644 --- a/docs/formatdomaincaps.html.in +++ b/docs/formatdomaincaps.html.in @@ -417,6 +417,12 @@ <value>3</value> </enum> </gic> + <sev> + <pdh> </pdh> + <cert-chain> </cert-chain> + <cbitpos> </cbitpos> + <reduced-phys-bits> </reduced-phys-bits> + </sev> </features> </domainCapabilities> @@ -441,5 +447,39 @@ gic element. =20 +

SEV capabilities

+ +

AMD Secure Encrypted Virtualization (SEV) capabilities are exposed = under + the sev element. + SEV is an extension to the AMD-V architecture which supports running + virtual machines (VMs) under the control of a hypervisor. When support= ed, + guest owner can create a VM whose memory contents will be transparently + encrypted with a key unique to that VM. + + For more details on SEV feature see: + + SEV API spec and \n"); + virBufferAdjustIndent(buf, 2); + virBufferAsprintf(buf, "%d\n", sev->cbitpos); + virBufferAsprintf(buf, "%d\n", + sev->reduced_phys_bits); + virBufferAsprintf(buf, "%s\n", sev->pdh); + virBufferAsprintf(buf, "%s\n", + sev->cert_chain); + virBufferAdjustIndent(buf, -2); + virBufferAddLit(buf, "\n"); +} + =20 char * virDomainCapsFormat(virDomainCapsPtr const caps) @@ -587,6 +606,7 @@ virDomainCapsFormat(virDomainCapsPtr const caps) virBufferAdjustIndent(&buf, 2); =20 virDomainCapsFeatureGICFormat(&buf, &caps->gic); + virDomainCapsFeatureSEVFormat(&buf, caps->sev); =20 virBufferAdjustIndent(&buf, -2); virBufferAddLit(&buf, "\n"); diff --git a/src/conf/domain_capabilities.h b/src/conf/domain_capabilities.h index 72e9daf..2e8596c 100644 --- a/src/conf/domain_capabilities.h +++ b/src/conf/domain_capabilities.h @@ -170,6 +170,7 @@ struct _virDomainCaps { /* add new domain devices here */ =20 virDomainCapsFeatureGIC gic; + virSEVCapabilityPtr sev; /* add new domain features here */ }; =20 diff --git a/src/qemu/qemu_capabilities.c b/src/qemu/qemu_capabilities.c index 0f6e6fb..3fd4911 100644 --- a/src/qemu/qemu_capabilities.c +++ b/src/qemu/qemu_capabilities.c @@ -5787,6 +5787,8 @@ virQEMUCapsFillDomainCaps(virCapsPtr caps, virQEMUCapsFillDomainDeviceHostdevCaps(qemuCaps, hostdev) < 0 || virQEMUCapsFillDomainFeatureGICCaps(qemuCaps, domCaps) < 0) return -1; + + domCaps->sev =3D qemuCaps->sevCapabilities; return 0; } =20 --=20 2.7.4 -- libvir-list mailing list libvir-list@redhat.com https://www.redhat.com/mailman/listinfo/libvir-list