From nobody Thu May 2 00:05:55 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) client-ip=209.132.183.28; envelope-from=libvir-list-bounces@redhat.com; helo=mx1.redhat.com; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1568980041; cv=none; d=zoho.com; s=zohoarc; b=SQYBHu/rrNqKJVAHWKWuBLjUBPbjgBeoDfFWMDX5loNe+zU29hznrr5w2xCPJK5qy+ZIcb/se+mOBkGSo7SuwxXy1FXDm0sB8j3CsBR+rnTIA3xcaX5BOEU84UOV0k8+rzqFQhyzr2UoYSuBY1O/5fHJcweRsU0TvNHNJXfg1mI= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1568980041; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:To:ARC-Authentication-Results; bh=+cLOaPpVM8dpT0HjW4dMg4HT98t6+tlo9v8X8XB48Qk=; b=JZkrD9NvWRTelH1EiGcpN7+qrJe1TWkKp8HrbbF7WMVJG/OLBJ+0rGwvZpkSisOT++QZyXaJ3N75AkIUjeblZ4XbtH8GjuLN0J8u0eDVQ8tl1S+jkZxDznRfO6YtdElA94wQJiUmLpfXJmRNtpAaOeI9s74ptc8KE8B5FdxiMls= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com; dmarc=pass header.from= (p=none dis=none) header.from= Return-Path: Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by mx.zohomail.com with SMTPS id 1568980041052706.9193170063688; Fri, 20 Sep 2019 04:47:21 -0700 (PDT) Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 68C073CBC3; Fri, 20 Sep 2019 11:47:19 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 44E7019D70; Fri, 20 Sep 2019 11:47:19 +0000 (UTC) Received: from lists01.pubmisc.prod.ext.phx2.redhat.com (lists01.pubmisc.prod.ext.phx2.redhat.com [10.5.19.33]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id F3CDC4EDA6; Fri, 20 Sep 2019 11:47:18 +0000 (UTC) Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) by lists01.pubmisc.prod.ext.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id x8KBlHnQ003885 for ; Fri, 20 Sep 2019 07:47:17 -0400 Received: by smtp.corp.redhat.com (Postfix) id 4966F60606; Fri, 20 Sep 2019 11:47:17 +0000 (UTC) Received: from ridgehead.brq.redhat.com (unknown [10.43.2.50]) by smtp.corp.redhat.com (Postfix) with ESMTP id 9F958608C2; Fri, 20 Sep 2019 11:47:13 +0000 (UTC) From: Erik Skultety To: libvir-list@redhat.com Date: Fri, 20 Sep 2019 13:47:09 +0200 Message-Id: <34880ad9cc1806b310f0db7fcac28019770021f4.1568980003.git.eskultet@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-loop: libvir-list@redhat.com Cc: Erik Skultety Subject: [libvirt] [PATCH] docs: kbase: Add a section explaining how to verify SEV from the guest X-BeenThere: libvir-list@redhat.com X-Mailman-Version: 2.1.12 Precedence: junk List-Id: Development discussions about the libvirt library & tools List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Transfer-Encoding: quoted-printable Sender: libvir-list-bounces@redhat.com Errors-To: libvir-list-bounces@redhat.com X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Fri, 20 Sep 2019 11:47:19 +0000 (UTC) Content-Type: text/plain; charset="utf-8" Commit 50dfabbb59 forgot to add this important bit on how to check that all the changes to the XML actually worked. Reviewed-by: J=C3=A1n Tomko --- docs/kbase/launch_security_sev.html.in | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/docs/kbase/launch_security_sev.html.in b/docs/kbase/launch_sec= urity_sev.html.in index 923bb52b25..4b8e06ccc1 100644 --- a/docs/kbase/launch_security_sev.html.in +++ b/docs/kbase/launch_security_sev.html.in @@ -349,6 +349,18 @@ EOF ... </domain> +

Checking SEV from within the guest

+

+ After making the necessary adjustments discussed in + Configuration, the VM should now bo= ot + successfully with SEV enabled. You can then verify that the guest + enabled with SEV by running: +

+ +
+# dmesg | grep -i sev
+AMD Secure Encrypted Virtualization (SEV) active
+

Limitations

Currently, the boot disk cannot be of type virtio-blk, instead, vi= rtio-scsi -- 2.20.1 -- libvir-list mailing list libvir-list@redhat.com https://www.redhat.com/mailman/listinfo/libvir-list