From nobody Wed May 14 15:53:57 2025 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com Return-Path: Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by mx.zohomail.com with SMTPS id 1522678801622633.82042982449; Mon, 2 Apr 2018 07:20:01 -0700 (PDT) Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 2D891804ED; Mon, 2 Apr 2018 14:20:00 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id F31475D753; Mon, 2 Apr 2018 14:19:59 +0000 (UTC) Received: from lists01.pubmisc.prod.ext.phx2.redhat.com (lists01.pubmisc.prod.ext.phx2.redhat.com [10.5.19.33]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id B5C074CA9C; Mon, 2 Apr 2018 14:19:59 +0000 (UTC) Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) by lists01.pubmisc.prod.ext.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id w32EJw9U024229 for ; Mon, 2 Apr 2018 10:19:58 -0400 Received: by smtp.corp.redhat.com (Postfix) id D7E39764FA; Mon, 2 Apr 2018 14:19:58 +0000 (UTC) Received: from mx1.redhat.com (ext-mx02.extmail.prod.ext.phx2.redhat.com [10.5.110.26]) by smtp.corp.redhat.com (Postfix) with ESMTPS id B5448789AF; Mon, 2 Apr 2018 14:19:54 +0000 (UTC) Received: from NAM01-SN1-obe.outbound.protection.outlook.com (mail-sn1nam01on0087.outbound.protection.outlook.com [104.47.32.87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 14C13883A5; Mon, 2 Apr 2018 14:19:53 +0000 (UTC) Received: from wsp141597wss.amd.com (165.204.78.1) by BY2PR12MB0145.namprd12.prod.outlook.com (2a01:111:e400:585a::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.631.10; Mon, 2 Apr 2018 14:19:46 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=Yb3N1n9rVrdDBaNdJHo8rX3rpy6ladk/xdn/INTg7eI=; b=i/mxhg08lUi/KCKWX5ruVLRx43qWVOeih7YMUf8QJVM1VV+G3MlpI1hnJofV0y9MJilshP0H7XHZDTUaVQeUuFLPiUK0F6UBe+QbOQ/RAiDn4FDoNiUUD7tqVonGX4Doss2MypJdHIGQL9Yp4rRaXpfpUnsgz3Le6QIj5gYg5tc= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=brijesh.singh@amd.com; From: Brijesh Singh To: libvir-list@redhat.com Date: Mon, 2 Apr 2018 09:18:48 -0500 Message-Id: <20180402141856.4596-3-brijesh.singh@amd.com> In-Reply-To: <20180402141856.4596-1-brijesh.singh@amd.com> References: <20180402141856.4596-1-brijesh.singh@amd.com> MIME-Version: 1.0 X-Originating-IP: [165.204.78.1] X-ClientProxiedBy: SN4PR0501CA0001.namprd05.prod.outlook.com (2603:10b6:803:40::14) To BY2PR12MB0145.namprd12.prod.outlook.com (2a01:111:e400:585a::18) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 3a64b330-34bb-4b2c-d6b2-08d598a4c9fe X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:BY2PR12MB0145; X-Microsoft-Exchange-Diagnostics: 1; BY2PR12MB0145; 3:8lNMyFXUkEV81F+O+7QMykE9+MMiZ4hPMKZfsUFcgtRySWX49PDqwgBaclGyaImceZ2fY7HYW5HIKHRV8yZfjTzbIPTSZaU42vReNqrZs2BM8zokTS7T8c5kjKVspPcpKSPFJdVMkMHA6ZbQlfu8utAFsIW2dmK4L8WoWm1dOjYmjpbAJEskBI9pBmsu3E6vXjxNCUMrHoq1eqnM06/Q6RlcDG4Yice1CCQ27Je4BZ5vPx/L7fhfcJ9/N5LXC20h; 25:lP5Iz3CNoPrcRojWWRTJGGTYqzbvpb6wdLqhcHXsuFJzmRNxKe+0a7mmktDL1RP7v7CHNq8jHTHZX28rpKoFrlZSkV4sAE2D/PSpIlVzy6a0YQSbsNVLkmQKvJpCLReMG6vmFwNsyrWxsDrioARxgQxiskXDDoqPzPtLQxCUiEjOAFZlvCM/uU3zPMnk4l6Hm7br/gJygz5kcZR/2pCVNQaV2zhkvG6ogsfwNVav0u2/QnUs0+bUZntCcweZTU95FPfy74vl8gBSOsRt2gfg3WJuopQ0rIIi2ln+5lX0AyICGavdmSObek5+5BeqyQP6CSXIwgynmmMlBPL0WaKaMQ==; 31:WKAL5YN9kv9OJzZd0D1ydSYwy6bVAHhD2Ge4vlQz47dSwoCJ+zlx8XG1kTIrY/EQHtiL++sCHZ0LrDMtsJ/mKJOXU5cz0yGhzr3+vyet3jmOb8ARc9Ghx6ZSKH0Bz6E30PMzqeRm7lx1d4tpQgV+rfmh0kjqSYPLMbOF5dUEPrZIBNozOCqN0o+OADUlJ5RTEN7dnuR7JnCtu5ZQuLCJIPwiTutRyTcHPQYbu9t5Ieg= X-MS-TrafficTypeDiagnostic: BY2PR12MB0145: X-Microsoft-Exchange-Diagnostics: 1; BY2PR12MB0145; 20:bLmRWGkbk7In2jCFuUXwHoEiCXw38MD7qjtIlEAPhrRdqkWMp6pXBFTwUyjL5gXiazP4r12+qL+AA4pc4pUP10euneaHSHBVP+yeVpEQPbvjxGjmA2eDAGDko6mXPU67cplA89LnpZsO8w8lrGenYJuHJo0jblV7ryf+TK9e5N/Pey/JAp0UPbLCc7JN6OO1XbiLMuA6WHMHFWFcDIKKA6c71Vz0D/zDL8Ja3YaiUJcnUjFRh2lk7kdWpGbedM7GCiEVC60GY5B8/r6fICnd3BwLHJCD8nZmqvgjtiNIc989oK1QFx55uuF/zsHItf64T927TTlJk3DbDIkds9O7IoqWFBN+hbAoUMgKdW4T7NMJSt7KEZBRmECiLHu/wUxI//JLS5RxlfFH6b+D9qVAes4xvv8PjY/J2C+tMi6BbYOdIsQWQtBqnxBLBk+ZeQMTCv02x8qmlr454KqItv9vZnCWqY5hXrkM6hoUMR3hxWOfSJ7zphLN830SPxq/6iQn; 4:ZfhYGfeueqRmthMt2HlhCVrXJSoblvTmsn7vLegbDMdaZr/CZ4kCfFCX3L9scJ7+tp5RogptKgpN2Ghn+Yl2Rmi01FjI+/2F/pMK2a5/vSHhrDsDeUSD2cgY+RHaC6PI5wWRxOAkdHf8yaUTAgBRJvamspDlRwSnreS1XBZtMW2deMWhRzP5rffHiCUra1jLaoD5JyPUL0hnOjrATCWP5puSszKfJDdl+25xbqrSax55a8ug95pWUI6yWgBC1v+5hPRGQfTouo2IYcEA9gp7lUX1zVtufVPe+DJfUhwuOGvM0NobFxPR35kUfmKh22iH X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(93006095)(93001095)(10201501046)(3002001)(3231221)(944501327)(52105095)(6055026)(6041310)(20161123564045)(20161123558120)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(6072148)(201708071742011); SRVR:BY2PR12MB0145; BCL:0; PCL:0; RULEID:; SRVR:BY2PR12MB0145; X-Forefront-PRVS: 0630013541 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(396003)(366004)(346002)(376002)(39860400002)(39380400002)(199004)(189003)(25786009)(956004)(486005)(6916009)(36756003)(81166006)(50226002)(186003)(606006)(2870700001)(23676004)(97736004)(54906003)(316002)(478600001)(26005)(1076002)(8676002)(6486002)(2351001)(50466002)(8936002)(16526019)(106356001)(47776003)(66066001)(53936002)(4326008)(81156014)(2616005)(2361001)(486005)(476003)(7736002)(446003)(53416004)(59450400001)(298455003)(6306002)(6116002)(11346002)(5660300001)(68736007)(86362001)(76176011)(105586002)(7696005)(2906002)(236005)(52116002)(3846002)(386003); DIR:OUT; SFP:1101; SCL:1; SRVR:BY2PR12MB0145; H:wsp141597wss.amd.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; Received-SPF: pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) client-ip=209.132.183.28; envelope-from=libvir-list-bounces@redhat.com; helo=mx1.redhat.com; Received-SPF: None (protection.outlook.com: amd.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCWTJQUjEyTUIwMTQ1OzIzOk5tKzBZS0VtaDRJNlhnZXdzUG9YRkRHdExB?= =?utf-8?B?U1I5bTU4bm9yRFRqUDFuNFROeUZBQkVST01laVprN05pQkwrRmtlSFZYU1Aw?= =?utf-8?B?SzZOSW4xSkE5c3NUSEJXYXRoQXJEQloweVZXb3ZQMlJwRWdXL3dSai92c2Jz?= =?utf-8?B?Smc2S1l2K1NDc1lJVWg4YzZ4L0p0czE1WjhNWXVteFRoeDNlcUF1RGFVU1ZZ?= =?utf-8?B?Z0Q2MkZWV2JXRlczdTZ5SXc2dVJzTWdhZDdMdjVzSysvUERQU1NLc1ZOUnhP?= =?utf-8?B?dDNHZWhTUThTcVZOaHR2eS9qRUJOdmdRc2RVZXdhaGxQSEFXZzNubG9BV3g1?= =?utf-8?B?dldvSFF1WkUrUGFPSGx0VWJmQWlobHlDdDU2ZHI1S2lHOWhESkpFemcyemlL?= =?utf-8?B?YmFKRkV2NndxY2U2TVlNbWhybjh2RmczSU9obDZlbkhrU2IxdFc2NkdRYmRn?= =?utf-8?B?MkpRMHRRUlFaSHppUk5RYStTY3lCNHZUYUM2ZXYyNkJkVzN5UHQyZnA4QzVh?= =?utf-8?B?QzFkZGpDU2kvNFZWbVhsNGh5YlMwNkRoVDdyTFhKZys5S085VGZQcmpnZ2hF?= =?utf-8?B?Z1dsVUkvWjlYZ2h0SVJRbklzTVdobndkbHZkRzhXSFBHSWc3MFdCU29yQ2JC?= =?utf-8?B?NTFwa3lvdW0rSDVXWDNuQjlTdFJMNktudDhET2h4L0UwZVQ2SDM2WEljbktr?= =?utf-8?B?RjkzOUdkWEtsS0xTM0JHbFk5MVZJZnoyWW1zd0pLRTdaWlE4cWhaNEhHQnov?= =?utf-8?B?YzRTZmlQS0FUR3NRbDlJYzl3TFVzNFBPU2RFbW9oQ0VsUndodU5nUDJVN29n?= =?utf-8?B?YWhrODl5TElGS3BBRDVHSHo0RWIzMkg0dFlwSk5jZ1ZMV2dkcm1vTTYzOHp1?= =?utf-8?B?SUJiejdYNEFURHNOYlpvemx3d1I4S0lVUGhlVTNnT0xUbktDM1V0MDhibWh3?= =?utf-8?B?WFhGZmlBK1VOV1NHeXJaOEFHTEJzOWtBczVEaXNBMWNrYTlVN242dmlhTnI4?= =?utf-8?B?eGRQMlFQK2lGbFg3S2hUU3hvMXFucnFUOUY4aUhML3lJNm9scDUzWmNndUNG?= =?utf-8?B?dU9melMyT3RCeWpmajVtYjZMOVgzeVRMSXlXNGo5SUtrM1J2NFlhY0NzYTNW?= =?utf-8?B?WWdZam5tcm5LUEYzZklnOEh5U2NVSk0rVFVGRlFmTEtldENGTVI4cGJUVVVj?= =?utf-8?B?SDdTR25SVktNTVovb3p3K3RHRWhGQjdia0RENDdKM0NWenhsdHlRNFAvTVlO?= =?utf-8?B?M2Z3OTN6ZnFJZVM5Q2cxYm9IYUZVM2s1RjVPSTJXUVVRUjk1TS9mZjlsRnBp?= =?utf-8?B?Zmp6V1hTeDdZbHdHTWJxRytzc3JqWXFJcmRMS1NJTmdCbXY5ejEzeGJHak42?= =?utf-8?B?MitJTUpEU1JjZVhtMWd2TDBFbkRFQjBxQWQvUGRRZWFXVDUxTGtKYTNpbzMy?= =?utf-8?B?TnJ1TGJ1NkI2OEJsZUJ1eFlqTjU1Qm5Xc3A1K1E1cTVyWU5EZmoxR0pEdFAr?= =?utf-8?B?MTl4OFZFMnFzdjNPb1pDQ1hQS3oza0daT0J0YS9HNE4vejhYZzVaV3RHUElt?= =?utf-8?B?TEViMVBxVEFDRVg1YnU3RmJGbWpnejZhZlhpa3Vjd05MTEhaaVhOQkE4S09U?= =?utf-8?B?SWtsbjlYVDhiVXdxaFU1cmpVeWVRSFR6MmlnQ3ZpWmhETk92bnhlL1pocEhD?= =?utf-8?B?UmtpWk9IbzJwQ2xrUEUya2NVRmJ1YTZyRjBHTXNzVzk5UzJLaHJvUXRLYkFP?= =?utf-8?Q?b6isxan9RZ+7vysssXx7Yh/MdYcQ4RxImLQHo=3D?= X-Microsoft-Antispam-Message-Info: iQoHenWo6HmtccjvtdJ8pyqgsIOfVDU/IjrY2y0SH/lpwuG5Fj2ewwgbOWXiFQnBbXB3/W92wc4WUqF9e4UnyByRaAyEfDMjVb6TkaC0+vHxgePeI+OfO9Vjv1igA/JZrgBruHa2Uioeeb1lheFqXzpdfkQHKxLEqpnn1a90qjyLSRHtbOHHYsWDigHI8znn X-Microsoft-Exchange-Diagnostics: 1; BY2PR12MB0145; 6:EudPUFBEKXNqJvL/A2LO1bffD27bfhmgH00gyYG+X6WUy47dCiztkKGLMtdpp6X96n9GGM0tBfUkmXXVWNtBSoZgTljYUzi/GFIzhQdxHWmzwA81wJNno8E94YSX8JslwVSUGIw6Xv0ySy9Zn/n6Z7iUFIRKAQ3cMuhV25xt9BNmoZcJenX8HhjsQDIW6b8yxXCaISm+KFPpxuoMVsld+3TxTn80Slscx00B2FCpOMKBlK4kG//aEIWXJOl6aF6angIVA+Ayeo2tKt1sK6Ms2lh8RPew5dTdhGeMSnaNfe/2xH0BX85a9wnZmkhDrfveQ87HicuMRkXQzvY6GN1O14jl//AqXdB5BXqX0pEs55ykIeqSnjwdznhcjuVmpbWm0QXiM5we7GmtRU/R2vDYYn3N2e9CmlR021rs3/oEq8OUIdD2OTwl36ucZ1PRfSZljo+HcYwd77rR6FVSNOjUQA==; 5:XI6PhgDAQ0qMVdRf1SWdyk5GumP601RqgkDvu41Np0NUK5kNG3nKjjqRTtp/g+7ztvK/hxLMErRqqTFETtJw1vQRvlKSiBwOLxSijlhJrBhQr4GmtKCLUY8MVIvlTlaTA80as3Z9O+QFeS01OKpt10BIKB/40L+RAL9sEccgRaA=; 24:g3TaPJXma0Mim7awqXnK7MrU01h6cSt2CTjGNtGAj1UOeay2HSi8MO5d+rMxT/CGSvFAiHPYrWbuP9ksjMlPXWT5uXuX7uPXU406pIKXxqo= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BY2PR12MB0145; 7:VBjP0iXVnamn+jMDaOj8W335+GJfgM+6q8gvY1IsO31cp7QjHLA23CCnMCIEm87Yb63Mz4EfzV/CceStWfFYk0dIJk79HGqmCYDUWfMYdGOVUzBPwW4L8bYF2KZwgMWZ0BVrtS03rW/2OO5nWUl/EBB/u/n48FyHTfXC1dLqfzFetcAsEfA1lLBIt4omDAByM0r8rpNVR5h90nfQXNuH60c1kimUjCs9uHNfVtGIcvthA1ZpMJX7D3ismTCwv7He; 20:FT05bBtitLasokCk3tfEwWZYegLrBMYKz9C3cpSHWXeucPnvDordyj+xYj9kvFH97O7dyusn3967s9KWumxPWANMTHjxTyMZ3DAlAUWNeTXYBwHggOwcbKbarUUhIYg7sSDqdUV8PEIWiNxWfWiGV99FCziM8Uk3aqa5TxXMgn9GSXBMdP2dFY2JeuVmL8p8jIJvmFeE23/BQSDOCfKTWMB5OF5SydFpLZUc4x9DRwGxvfYtHN+qZ3/SXDGryWkE X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Apr 2018 14:19:46.6741 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 3a64b330-34bb-4b2c-d6b2-08d598a4c9fe X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2PR12MB0145 X-Greylist: Sender passed SPF test, Sender IP whitelisted by DNSRBL, ACL 207 matched, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Mon, 02 Apr 2018 14:19:53 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Mon, 02 Apr 2018 14:19:53 +0000 (UTC) for IP:'104.47.32.87' DOMAIN:'mail-sn1nam01on0087.outbound.protection.outlook.com' HELO:'NAM01-SN1-obe.outbound.protection.outlook.com' FROM:'brijesh.singh@amd.com' RCPT:'' X-RedHat-Spam-Score: -0.011 (DKIM_SIGNED, DKIM_VALID, RCVD_IN_DNSWL_NONE, SPF_HELO_PASS) 104.47.32.87 mail-sn1nam01on0087.outbound.protection.outlook.com 104.47.32.87 mail-sn1nam01on0087.outbound.protection.outlook.com X-Scanned-By: MIMEDefang 2.78 on 10.5.110.26 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 X-loop: libvir-list@redhat.com Cc: Tom Lendacky , Peter Krempa , Jon Grimm , Andrea Bolognani , Brijesh Singh , Borislav Petkov Subject: [libvirt] [PATCH v5 02/10] qemu: introduce SEV feature in hypervisor capabilities X-BeenThere: libvir-list@redhat.com X-Mailman-Version: 2.1.12 Precedence: junk List-Id: Development discussions about the libvirt library & tools List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Sender: libvir-list-bounces@redhat.com Errors-To: libvir-list-bounces@redhat.com X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.27]); Mon, 02 Apr 2018 14:20:00 +0000 (UTC) X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZohoMail: RDKM_2 RSF_0 Z_629925259 SPT_0 Extend hypervisor capabilities to include sev feature. When available, hypervisor supports launching an encrypted VM on AMD platform. The sev feature tag provides additional details like platform diffie-hellman key and certificate chain which can be used by the guest owner to establish a cryptographic session with the SEV firmware to negotiate keys used for attestation or to provide secret during launch. Reviewed-by: "Daniel P. Berrang=C3=A9" Signed-off-by: Brijesh Singh --- docs/formatdomaincaps.html.in | 40 ++++++++++++++++++++++++++++++++++++++= ++ docs/schemas/domaincaps.rng | 20 ++++++++++++++++++++ src/conf/domain_capabilities.c | 20 ++++++++++++++++++++ src/conf/domain_capabilities.h | 1 + src/qemu/qemu_capabilities.c | 2 ++ 5 files changed, 83 insertions(+) diff --git a/docs/formatdomaincaps.html.in b/docs/formatdomaincaps.html.in index 6bfcaf6..f383141 100644 --- a/docs/formatdomaincaps.html.in +++ b/docs/formatdomaincaps.html.in @@ -417,6 +417,12 @@ <value>3</value> </enum> </gic> + <sev> + <pdh> </pdh> + <cert-chain> </cert-chain> + <cbitpos> </cbitpos> + <reduced-phys-bits> </reduced-phys-bits> + </sev> </features> </domainCapabilities> @@ -441,5 +447,39 @@ gic element. =20 +

SEV capabilities

+ +

AMD Secure Encrypted Virtualization (SEV) capabilities are exposed = under + the sev element. + SEV is an extension to the AMD-V architecture which supports running + virtual machines (VMs) under the control of a hypervisor. When support= ed, + guest owner can create a VM whose memory contents will be transparently + encrypted with a key unique to that VM. + + For more details on SEV feature see: + + SEV API spec and \n"); + virBufferAdjustIndent(buf, 2); + virBufferAsprintf(buf, "%d\n", sev->cbitpos); + virBufferAsprintf(buf, "%d\n", + sev->reduced_phys_bits); + virBufferAsprintf(buf, "%s\n", sev->pdh); + virBufferAsprintf(buf, "%s\n", + sev->cert_chain); + virBufferAdjustIndent(buf, -2); + virBufferAddLit(buf, "\n"); +} + =20 char * virDomainCapsFormat(virDomainCapsPtr const caps) @@ -587,6 +606,7 @@ virDomainCapsFormat(virDomainCapsPtr const caps) virBufferAdjustIndent(&buf, 2); =20 virDomainCapsFeatureGICFormat(&buf, &caps->gic); + virDomainCapsFeatureSEVFormat(&buf, caps->sev); =20 virBufferAdjustIndent(&buf, -2); virBufferAddLit(&buf, "\n"); diff --git a/src/conf/domain_capabilities.h b/src/conf/domain_capabilities.h index 72e9daf..2e8596c 100644 --- a/src/conf/domain_capabilities.h +++ b/src/conf/domain_capabilities.h @@ -170,6 +170,7 @@ struct _virDomainCaps { /* add new domain devices here */ =20 virDomainCapsFeatureGIC gic; + virSEVCapabilityPtr sev; /* add new domain features here */ }; =20 diff --git a/src/qemu/qemu_capabilities.c b/src/qemu/qemu_capabilities.c index 0f6e6fb..3fd4911 100644 --- a/src/qemu/qemu_capabilities.c +++ b/src/qemu/qemu_capabilities.c @@ -5787,6 +5787,8 @@ virQEMUCapsFillDomainCaps(virCapsPtr caps, virQEMUCapsFillDomainDeviceHostdevCaps(qemuCaps, hostdev) < 0 || virQEMUCapsFillDomainFeatureGICCaps(qemuCaps, domCaps) < 0) return -1; + + domCaps->sev =3D qemuCaps->sevCapabilities; return 0; } =20 --=20 2.7.4 -- libvir-list mailing list libvir-list@redhat.com https://www.redhat.com/mailman/listinfo/libvir-list