[PATCH 11/12] qemu: Allow setting launch security for SEV-SNP

Michal Privoznik posted 12 patches 2 months, 4 weeks ago
[PATCH 11/12] qemu: Allow setting launch security for SEV-SNP
Posted by Michal Privoznik 2 months, 4 weeks ago
Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
---
 src/qemu/qemu_driver.c | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/src/qemu/qemu_driver.c b/src/qemu/qemu_driver.c
index fc1704f4fc..3a76df8ddb 100644
--- a/src/qemu/qemu_driver.c
+++ b/src/qemu/qemu_driver.c
@@ -19185,9 +19185,10 @@ qemuDomainSetLaunchSecurityState(virDomainPtr domain,
 
     /* Currently only SEV is supported */
     if (!vm->def->sec ||
-        vm->def->sec->sectype != VIR_DOMAIN_LAUNCH_SECURITY_SEV) {
+        (vm->def->sec->sectype != VIR_DOMAIN_LAUNCH_SECURITY_SEV &&
+         vm->def->sec->sectype != VIR_DOMAIN_LAUNCH_SECURITY_SEV_SNP)) {
         virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
-                       _("setting a launch secret is only supported in SEV-enabled domains"));
+                       _("setting a launch secret is only supported in SEV/SEV-SNP enabled domains"));
         goto cleanup;
     }
 
-- 
2.44.2
Re: [PATCH 11/12] qemu: Allow setting launch security for SEV-SNP
Posted by Daniel P. Berrangé 2 months, 4 weeks ago
On Thu, Jun 20, 2024 at 01:22:48PM +0200, Michal Privoznik wrote:
> Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
> ---
>  src/qemu/qemu_driver.c | 5 +++--
>  1 file changed, 3 insertions(+), 2 deletions(-)
> 
> diff --git a/src/qemu/qemu_driver.c b/src/qemu/qemu_driver.c
> index fc1704f4fc..3a76df8ddb 100644
> --- a/src/qemu/qemu_driver.c
> +++ b/src/qemu/qemu_driver.c
> @@ -19185,9 +19185,10 @@ qemuDomainSetLaunchSecurityState(virDomainPtr domain,
>  
>      /* Currently only SEV is supported */
>      if (!vm->def->sec ||
> -        vm->def->sec->sectype != VIR_DOMAIN_LAUNCH_SECURITY_SEV) {
> +        (vm->def->sec->sectype != VIR_DOMAIN_LAUNCH_SECURITY_SEV &&
> +         vm->def->sec->sectype != VIR_DOMAIN_LAUNCH_SECURITY_SEV_SNP)) {
>          virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
> -                       _("setting a launch secret is only supported in SEV-enabled domains"));
> +                       _("setting a launch secret is only supported in SEV/SEV-SNP enabled domains"));
>          goto cleanup;
>      }

I've not tested to be 100% sure, but I'm thinking this method is not
supportable on SNP. Its use case is related to host initiated
attestation workflow, where you inject a secret after attesting.
Conceptually this workflow isn't relevant for SNP with guest
initiated attestation workflows.


With regards,
Daniel
-- 
|: https://berrange.com      -o-    https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org         -o-            https://fstop138.berrange.com :|
|: https://entangle-photo.org    -o-    https://www.instagram.com/dberrange :|