]> xenbits.xensource.com Git - libvirt.git/commitdiff
docs: kbase: Add a section explaining how to verify SEV from the guest
authorErik Skultety <eskultet@redhat.com>
Fri, 20 Sep 2019 11:47:09 +0000 (13:47 +0200)
committerErik Skultety <eskultet@redhat.com>
Mon, 23 Sep 2019 08:19:15 +0000 (10:19 +0200)
Commit 50dfabbb59 forgot to add this important bit on how to check that
all the changes to the XML actually worked.

Signed-off-by: Erik Skultety <eskultet@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
docs/kbase/launch_security_sev.html.in

index 923bb52b250867301b07481622876741316f5e3a..985c11a47b1668f14dec4b850e047fe752833e21 100644 (file)
@@ -349,6 +349,18 @@ EOF</pre>
   ...
 &lt;/domain&gt;</pre>
 
+    <h2><a id="Guest">Checking SEV from within the guest</a></h2>
+    <p>
+        After making the necessary adjustments discussed in
+        <a href="#Configuration">Configuration</a>, the VM should now boot
+        successfully with SEV enabled. You can then verify that the guest has
+        SEV enabled by running:
+    </p>
+
+    <pre>
+# dmesg | grep -i sev
+AMD Secure Encrypted Virtualization (SEV) active</pre>
+
     <h2><a id="Limitations">Limitations</a></h2>
     <p>
         Currently, the boot disk cannot be of type virtio-blk, instead, virtio-scsi