summaryrefslogtreecommitdiff
path: root/virtinst/domain/launch_security.py
blob: 9d2998d93f6eed31253ff394794d2dfb3cbf7f89 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
from ..xmlbuilder import XMLBuilder, XMLProperty


class DomainLaunchSecurity(XMLBuilder):
    """
    Class for generating <launchSecurity> XML element
    """

    XML_NAME = "launchSecurity"
    _XML_PROP_ORDER = ["type", "cbitpos", "reducedPhysBits", "policy",
            "session", "dhCert"]

    type = XMLProperty("./@type")
    cbitpos = XMLProperty("./cbitpos", is_int=True)
    reducedPhysBits = XMLProperty("./reducedPhysBits", is_int=True)
    policy = XMLProperty("./policy")
    session = XMLProperty("./session")
    dhCert = XMLProperty("./dhCert")
    kernelHashes = XMLProperty("./@kernelHashes", is_yesno=True)

    def _set_defaults_sev(self, guest):
        if not guest.os.is_q35() or not guest.is_uefi():
            raise RuntimeError(_("SEV launch security requires a Q35 UEFI machine"))

        # The 'policy' is a mandatory 4-byte argument for the SEV firmware.
        # If missing, we use 0x03 for the original SEV implementation and
        # 0x07 for SEV-ES.
        # Reference: https://libvirt.org/formatdomain.html#launchSecurity
        if self.policy is None:
            domcaps = guest.lookup_domcaps()
            self.policy = "0x03"
            if domcaps.supports_sev_launch_security(check_es=True):
                self.policy = "0x07"

    def set_defaults(self, guest):
        if self.type == "sev":
            return self._set_defaults_sev(guest)