On 12/15/21 04:40, Haibin Huang wrote: > This patch series provides support for enabling Intel's Software Guard > Extensions (SGX) feature in guest VM. > Giving the SGX support in QEMU be accepted and will be merged in two > days Intel SGX is a set of instructions that increases the security > of application code and data, giving them more protection from disclosure > or modification. > Developers can partition sensitive information into enclaves, which are > areas of execution in memory with more security protection. > > The typical flow looks below at very high level: > > 1. Calls virConnectGetDomainCapabilities API to domain capabilities that > includes the following SGX information. > > <feature> > ... > <sgx supported='yes'> > <epc_size unit='KiB'>N</epc_size> > </sgx> > </feature> > > 2. User requests to start a guest calling virCreateXML() with SGX requirement. > It should contain > > <devices> > ... > <memory model='sgx-epc'> > <target> > <size unit='KiB'>N</size> > </target> > </memory> > ... > </devices> > > Haibin Huang (2): > Get SGX Capabilities from QEMU > Transfer Qemu SGX Capabilities to XML > > Lin Yang (3): > conf: Introduce SGX EPC element into device memory xml > qemu: Add command-line to generate SGX EPC memory backend > Add unit tests for guest VM creation command with SGX EPC Next time please make sure that any patch you send is rebased onto the master branch that's at least somewhat current. I had to go all the way down to 7.8.0 to apply these (somewhere mid October). I believe libvirt is not the only project that mandates this. I've uploaded these patches to my gitlab: https://gitlab.com/MichalPrivoznik/libvirt/-/tree/sgx You'll find 'fixup' commits there which cover some of the points I am raising. Might be worth looking at it. I'll keep the branch there for a while. Michal