mirror of
https://github.com/Motorhead1991/qemu.git
synced 2025-08-08 02:03:56 -06:00
confidential guest support: Move SEV initialization into arch specific code
While we've abstracted some (potential) differences between mechanisms for securing guest memory, the initialization is still specific to SEV. Given that, move it into x86's kvm_arch_init() code, rather than the generic kvm_init() code. Signed-off-by: David Gibson <david@gibson.dropbear.id.au> Reviewed-by: Cornelia Huck <cohuck@redhat.com> Reviewed-by: Greg Kurz <groug@kaod.org>
This commit is contained in:
parent
abc27d4241
commit
ec78e2cda3
4 changed files with 28 additions and 17 deletions
|
@ -664,13 +664,18 @@ sev_vm_state_change(void *opaque, int running, RunState state)
|
|||
|
||||
int sev_kvm_init(ConfidentialGuestSupport *cgs, Error **errp)
|
||||
{
|
||||
SevGuestState *sev = SEV_GUEST(cgs);
|
||||
SevGuestState *sev
|
||||
= (SevGuestState *)object_dynamic_cast(OBJECT(cgs), TYPE_SEV_GUEST);
|
||||
char *devname;
|
||||
int ret, fw_error;
|
||||
uint32_t ebx;
|
||||
uint32_t host_cbitpos;
|
||||
struct sev_user_data_status status = {};
|
||||
|
||||
if (!sev) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
ret = ram_block_discard_disable(true);
|
||||
if (ret) {
|
||||
error_report("%s: cannot disable RAM discard", __func__);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue