1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
|
<think>
Okay, let me try to figure out how to classify this bug report. The problem is about QEMU failing measurements when using direct kernel boot for AMD SEV confidential virtualization with the 7.1 machine type. So, first, I need to understand what's going on here.
The user mentions that setting 'kernel-hashes:true' makes the firmware measure the contents of the -kernel file. A remote tenant can validate this measurement. But when using pc-q35-7.1, it always fails.
They provided a code change where they set 'legacy_no_rng_seed = true;' in pc_machine_class_init. This fix makes the measurements validate correctly. The note says that this is not surprising because another commit introduced RNG seed functionality which modifies the kernel image before passing it to firmware. This changes the boot measurements each time, which is good for security but shouldn't be used when AMD SEV is active.
So, the issue arises because the RNG seed feature interferes with the measurement process required by SEV. Therefore, the bug is about SEV guests and how RNG seeds are handled during boot.
Looking at the possible categories: hypervisor seems relevant here since SEV is a virtualization technology that interacts with the host's hypervisor (like KVM). However, another category is 'kernel' because it relates to kernel parameters or measurement. But wait, AMD SEV is part of the hypervisor features in QEMU/KVM.
Alternatively, maybe 'hypervisor' isn't the exact fit. Since the problem specifically involves SEV and how measurements are handled during boot, which ties into the hypervisor's role in secure virtualization.
Wait, the categories include 'hypervisor', so that might be the right one. But I'm a bit confused because sometimes SEV issues might fall under 'kernel' or 'peripherals'. However, since it's about the hypervisor's behavior when running SEV guests, 'hypervisor' seems more accurate.
</think>
The bug report involves issues with AMD SEV and how RNG seeds are handled during boot, which affects measurements used for validation in a secure virtualization context. This pertains to the hypervisor's functionality as it relates to SEV support.
**hypervisor**
|