aboutsummaryrefslogtreecommitdiff
path: root/target/i386/trace-events
diff options
context:
space:
mode:
authorTobin Feldman-Fitzthum <tobin@ibm.com>2020-10-27 13:03:03 -0400
committerEduardo Habkost <ehabkost@redhat.com>2020-12-10 17:33:17 -0500
commitc7f7e6970d3b74c1454cafea4918187e06c473eb (patch)
tree305f51bc016b3aec4654352ada698a427677f846 /target/i386/trace-events
parent1bf8b88f144bee747e386c88d45d772e066bbb36 (diff)
sev: add sev-inject-launch-secret
AMD SEV allows a guest owner to inject a secret blob into the memory of a virtual machine. The secret is encrypted with the SEV Transport Encryption Key and integrity is guaranteed with the Transport Integrity Key. Although QEMU facilitates the injection of the launch secret, it cannot access the secret. Signed-off-by: Tobin Feldman-Fitzthum <tobin@linux.ibm.com> Signed-off-by: Eduardo Habkost <ehabkost@redhat.com> Reviewed-by: Daniel P. Berrangé <berrange@redhat.com> Reviewed-by: Brijesh Singh <brijesh.singh@amd.com> Message-Id: <20201027170303.47550-1-tobin@linux.ibm.com> Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
Diffstat (limited to 'target/i386/trace-events')
-rw-r--r--target/i386/trace-events1
1 files changed, 1 insertions, 0 deletions
diff --git a/target/i386/trace-events b/target/i386/trace-events
index 789c700d4a..9f299e94a2 100644
--- a/target/i386/trace-events
+++ b/target/i386/trace-events
@@ -15,3 +15,4 @@ kvm_sev_launch_start(int policy, void *session, void *pdh) "policy 0x%x session
kvm_sev_launch_update_data(void *addr, uint64_t len) "addr %p len 0x%" PRIu64
kvm_sev_launch_measurement(const char *value) "data %s"
kvm_sev_launch_finish(void) ""
+kvm_sev_launch_secret(uint64_t hpa, uint64_t hva, uint64_t secret, int len) "hpa 0x%" PRIx64 " hva 0x%" PRIx64 " data 0x%" PRIx64 " len %d"