From: Daniel P. Berrangé <[email protected]> If we fail to find either SEV or TDX on x86, we can explicitly say there is no secure guest support on the platform.
Signed-off-by: Daniel P. Berrangé <[email protected]> --- tools/virt-host-validate-common.c | 18 +++++++++++------- 1 file changed, 11 insertions(+), 7 deletions(-) diff --git a/tools/virt-host-validate-common.c b/tools/virt-host-validate-common.c index 344f9656e5..6bca661ffc 100644 --- a/tools/virt-host-validate-common.c +++ b/tools/virt-host-validate-common.c @@ -492,13 +492,17 @@ int virHostValidateSecureGuests(const char *hvname, "support for IBM Secure Execution"); return VIR_VALIDATE_FAILURE(level); } - } else if (hasAMDSev) { - return virHostValidateAMDSev(hvname, level); - } else if (hasIntelTDX) { - return virHostValidateIntelTDX(level); + } else if (arch == VIR_ARCH_X86_64) { + if (hasAMDSev) { + return virHostValidateAMDSev(level); + } else if (hasIntelTDX) { + return virHostValidateIntelTDX(level); + } else { + virValidateFail(level, "None of SEV, SEV-ES, SEV-SNP, TDX available"); + } + } else { + virValidateFail(level, + "Unknown if this platform has Secure Guest support"); } - - virValidateFail(level, - "Unknown if this platform has Secure Guest support"); return VIR_VALIDATE_FAILURE(level); } -- 2.51.1
