aboutsummaryrefslogtreecommitdiff
path: root/accel
diff options
context:
space:
mode:
authorDavid Gibson <david@gibson.dropbear.id.au>2020-10-16 14:52:30 +1100
committerDavid Gibson <david@gibson.dropbear.id.au>2021-02-08 16:57:38 +1100
commitec78e2cda3e006e0e01e2177caf3718db5600635 (patch)
tree1de593d4da127a3b47a28b167bb7f006e6ad8c32 /accel
parentabc27d4241f99bfaebb0b843b9a967d557ac10e8 (diff)
downloadqemu-ec78e2cda3e006e0e01e2177caf3718db5600635.zip
qemu-ec78e2cda3e006e0e01e2177caf3718db5600635.tar.gz
qemu-ec78e2cda3e006e0e01e2177caf3718db5600635.tar.bz2
confidential guest support: Move SEV initialization into arch specific code
While we've abstracted some (potential) differences between mechanisms for securing guest memory, the initialization is still specific to SEV. Given that, move it into x86's kvm_arch_init() code, rather than the generic kvm_init() code. Signed-off-by: David Gibson <david@gibson.dropbear.id.au> Reviewed-by: Cornelia Huck <cohuck@redhat.com> Reviewed-by: Greg Kurz <groug@kaod.org>
Diffstat (limited to 'accel')
-rw-r--r--accel/kvm/kvm-all.c14
-rw-r--r--accel/kvm/sev-stub.c4
2 files changed, 2 insertions, 16 deletions
diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c
index 226e155..e72a19a 100644
--- a/accel/kvm/kvm-all.c
+++ b/accel/kvm/kvm-all.c
@@ -2180,20 +2180,6 @@ static int kvm_init(MachineState *ms)
kvm_state = s;
- /*
- * if memory encryption object is specified then initialize the memory
- * encryption context.
- */
- if (ms->cgs) {
- Error *local_err = NULL;
- /* FIXME handle mechanisms other than SEV */
- ret = sev_kvm_init(ms->cgs, &local_err);
- if (ret < 0) {
- error_report_err(local_err);
- goto err;
- }
- }
-
ret = kvm_arch_init(ms, s);
if (ret < 0) {
goto err;
diff --git a/accel/kvm/sev-stub.c b/accel/kvm/sev-stub.c
index 512e205..9587d1b 100644
--- a/accel/kvm/sev-stub.c
+++ b/accel/kvm/sev-stub.c
@@ -17,6 +17,6 @@
int sev_kvm_init(ConfidentialGuestSupport *cgs, Error **errp)
{
- /* SEV can't be selected if it's not compiled */
- g_assert_not_reached();
+ /* If we get here, cgs must be some non-SEV thing */
+ return 0;
}