diff options
| author | Tobin Feldman-Fitzthum <tobin@ibm.com> | 2020-10-27 13:03:03 -0400 |
|---|---|---|
| committer | Eduardo Habkost <ehabkost@redhat.com> | 2020-12-10 17:33:17 -0500 |
| commit | c7f7e6970d3b74c1454cafea4918187e06c473eb (patch) | |
| tree | 305f51bc016b3aec4654352ada698a427677f846 /target/i386/monitor.c | |
| parent | 1bf8b88f144bee747e386c88d45d772e066bbb36 (diff) | |
| download | focaccia-qemu-c7f7e6970d3b74c1454cafea4918187e06c473eb.tar.gz focaccia-qemu-c7f7e6970d3b74c1454cafea4918187e06c473eb.zip | |
sev: add sev-inject-launch-secret
AMD SEV allows a guest owner to inject a secret blob into the memory of a virtual machine. The secret is encrypted with the SEV Transport Encryption Key and integrity is guaranteed with the Transport Integrity Key. Although QEMU facilitates the injection of the launch secret, it cannot access the secret. Signed-off-by: Tobin Feldman-Fitzthum <tobin@linux.ibm.com> Signed-off-by: Eduardo Habkost <ehabkost@redhat.com> Reviewed-by: Daniel P. Berrangé <berrange@redhat.com> Reviewed-by: Brijesh Singh <brijesh.singh@amd.com> Message-Id: <20201027170303.47550-1-tobin@linux.ibm.com> Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
Diffstat (limited to 'target/i386/monitor.c')
| -rw-r--r-- | target/i386/monitor.c | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/target/i386/monitor.c b/target/i386/monitor.c index 9f9e1c42f4..1bc91442b1 100644 --- a/target/i386/monitor.c +++ b/target/i386/monitor.c @@ -729,3 +729,10 @@ SevCapability *qmp_query_sev_capabilities(Error **errp) { return sev_get_capabilities(errp); } + +void qmp_sev_inject_launch_secret(const char *packet_hdr, + const char *secret, uint64_t gpa, + Error **errp) +{ + sev_inject_launch_secret(packet_hdr, secret, gpa, errp); +} |