From nobody Mon Feb 9 18:18:19 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of redhat.com designates 216.205.24.124 as permitted sender) client-ip=216.205.24.124; envelope-from=philmd@redhat.com; helo=us-smtp-delivery-124.mimecast.com; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of redhat.com designates 216.205.24.124 as permitted sender) smtp.mailfrom=philmd@redhat.com; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1623876236; cv=none; d=zohomail.com; s=zohoarc; b=m9/nDLpKa0y0n+rrh15265rtH6fO7IdxCv2/pAXHX8E2ygsYp/5lZkN3RIaNrFSocoKpUj1PeGfA4iD6N9hsRJy0KXk9QcxCpTLkA2OJ+ChSRxZ70p4LtvwBBBfzo9QEchncm+YOVSbpJ/5HCuspIHhjHFKzfUAGIFmSLPYIWQI= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1623876236; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; bh=P0MVNMPFT2iPgR7XnSOdieFnhCqfHwDB3FuH7adTvvs=; b=PUxYfxYenrKOq5Mub+FiEkYFRCesf3k+v41/k7l47IB5jOlHG6XgQhC+yhXX5UhzC8LGfFB6vdCQql3+uKyhrcpHnCVDfGDCa1+0w2uWHEKbfWqhXQnnfAN2fzAbj4pXLzdVqkPCkJxUO+8xjvxaoeIL5hABL6XhZg4f0HAmTfk= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of redhat.com designates 216.205.24.124 as permitted sender) smtp.mailfrom=philmd@redhat.com; dmarc=pass header.from= (p=none dis=none) Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [216.205.24.124]) by mx.zohomail.com with SMTPS id 1623876236168649.3725831443243; Wed, 16 Jun 2021 13:43:56 -0700 (PDT) Received: from mail-wr1-f70.google.com (mail-wr1-f70.google.com [209.85.221.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-373-RLbdI0wuOk-lqGgbK2Il3g-1; Wed, 16 Jun 2021 16:43:53 -0400 Received: by mail-wr1-f70.google.com with SMTP id x9-20020adfffc90000b02901178add5f60so1869578wrs.5 for ; Wed, 16 Jun 2021 13:43:52 -0700 (PDT) Return-Path: Return-Path: Received: from x1w.. (93.red-83-35-24.dynamicip.rima-tde.net. [83.35.24.93]) by smtp.gmail.com with ESMTPSA id m37sm2445006wms.46.2021.06.16.13.43.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 16 Jun 2021 13:43:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1623876234; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=P0MVNMPFT2iPgR7XnSOdieFnhCqfHwDB3FuH7adTvvs=; b=hBXSTq4UyTEVb1v/KwxvY1G7AzyPlQ4fA3ZqgIetM/RylvDxC7MwrM4D6S944LAYYZgG5o IFhplsjUKh4ZmTzqtR8Wj0j8p/yINIE24zCH4Ow8Jtb76G8F6SluKMEaghFSTN3YLLqXJp lzpIsi6zWFTozq5UNwwgo9SJnNdoILM= X-MC-Unique: RLbdI0wuOk-lqGgbK2Il3g-1 X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=P0MVNMPFT2iPgR7XnSOdieFnhCqfHwDB3FuH7adTvvs=; b=e0i7K9xpQK5WXXf66+zuQNZHhbLqIVHaX78Wp8IO+hOBey6Fo/wMXOqRZM5uoWl0zX AAZVH8bMW6tEARL8yXX398A1kdYbtJjmi5dQz7Wk0sDNPJtzG3QYqrVmRW3ZmFXInIOD bSpPVLYsDmVbrUowAN0UEbNgCvbFBeLqo40yKwaPOZTCaoHcjzm0scrZHeb6yqS464SV QpCOeUJaIMiEbdd9pMEZzfFRJyQKITWDmOh1S1RCOea7d39JT/pkCO4M5p8nSk73Akz/ tsecXQG/DXTUN9QZDtDhzmlExyZ2JD+gJGqrQ1ahCmddSvQKgZNw2JQpv7duSppqLfgV Liog== X-Gm-Message-State: AOAM532XtGshj+m8Q/1IJhD8ywj5mwGaGMZQUOgtY9iB7t0AMSf2xhsy NA4+X/sTmebrPVFZ2W+3vdsg2/sFplKCsNYjekdTZBnBo6uHlfXQ617AY136mqg1JtOYvMzEgvO B7DUqgiCaVr8hfw== X-Received: by 2002:a5d:67cf:: with SMTP id n15mr1200945wrw.228.1623876229900; Wed, 16 Jun 2021 13:43:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwplhFANU5pzuPNxWZIeJm7JQpPrDirmo3H9Ue0VCXVvQOvNJwE61ASe3BEOXvjHMx/sFefjw== X-Received: by 2002:a5d:67cf:: with SMTP id n15mr1200918wrw.228.1623876229733; Wed, 16 Jun 2021 13:43:49 -0700 (PDT) From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= To: qemu-devel@nongnu.org Cc: Richard Henderson , Paolo Bonzini , Connor Kuehl , Gerd Hoffmann , Brijesh Singh , "Dr . David Alan Gilbert" , Eric Blake , Eduardo Habkost , Markus Armbruster , Igor Mammedov , James Bottomley , =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= , Sergio Lopez , Marcel Apfelbaum , "Michael S. Tsirkin" , Laszlo Ersek , Dov Murik Subject: [PATCH v2 03/23] qapi/misc-target: Group SEV QAPI definitions Date: Wed, 16 Jun 2021 22:43:08 +0200 Message-Id: <20210616204328.2611406-4-philmd@redhat.com> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210616204328.2611406-1-philmd@redhat.com> References: <20210616204328.2611406-1-philmd@redhat.com> MIME-Version: 1.0 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=philmd@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @redhat.com) There is already a section with various SEV commands / types, so move the SEV guest attestation together. Signed-off-by: Philippe Mathieu-Daud=C3=A9 Reviewed-by: Markus Armbruster --- qapi/misc-target.json | 81 +++++++++++++++++++++---------------------- 1 file changed, 40 insertions(+), 41 deletions(-) diff --git a/qapi/misc-target.json b/qapi/misc-target.json index 81646126267..7db94206212 100644 --- a/qapi/misc-target.json +++ b/qapi/misc-target.json @@ -219,6 +219,46 @@ 'data': { 'packet-header': 'str', 'secret': 'str', '*gpa': 'uint64' }, 'if': 'defined(TARGET_I386)' } =20 +## +# @SevAttestationReport: +# +# The struct describes attestation report for a Secure Encrypted +# Virtualization feature. +# +# @data: guest attestation report (base64 encoded) +# +# +# Since: 6.1 +## +{ 'struct': 'SevAttestationReport', + 'data': { 'data': 'str'}, + 'if': 'defined(TARGET_I386)' } + +## +# @query-sev-attestation-report: +# +# This command is used to get the SEV attestation report, and is +# supported on AMD X86 platforms only. +# +# @mnonce: a random 16 bytes value encoded in base64 (it will be +# included in report) +# +# Returns: SevAttestationReport objects. +# +# Since: 6.1 +# +# Example: +# +# -> { "execute" : "query-sev-attestation-report", +# "arguments": { "mnonce": "aaaaaaa" } } +# <- { "return" : { "data": "aaaaaaaabbbddddd"} } +# +## +{ 'command': 'query-sev-attestation-report', + 'data': { 'mnonce': 'str' }, + 'returns': 'SevAttestationReport', + 'if': 'defined(TARGET_I386)' } + ## # @dump-skeys: # @@ -285,44 +325,3 @@ ## { 'command': 'query-gic-capabilities', 'returns': ['GICCapability'], 'if': 'defined(TARGET_ARM)' } - - -## -# @SevAttestationReport: -# -# The struct describes attestation report for a Secure Encrypted -# Virtualization feature. -# -# @data: guest attestation report (base64 encoded) -# -# -# Since: 6.1 -## -{ 'struct': 'SevAttestationReport', - 'data': { 'data': 'str'}, - 'if': 'defined(TARGET_I386)' } - -## -# @query-sev-attestation-report: -# -# This command is used to get the SEV attestation report, and is -# supported on AMD X86 platforms only. -# -# @mnonce: a random 16 bytes value encoded in base64 (it will be -# included in report) -# -# Returns: SevAttestationReport objects. -# -# Since: 6.1 -# -# Example: -# -# -> { "execute" : "query-sev-attestation-report", - "arguments": { "mnonce": "aaaaaaa" } } -# <- { "return" : { "data": "aaaaaaaabbbddddd"} } -# -## -{ 'command': 'query-sev-attestation-report', - 'data': { 'mnonce': 'str' }, - 'returns': 'SevAttestationReport', - 'if': 'defined(TARGET_I386)' } --=20 2.31.1