[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[for-6.0 v5 07/13] sev: Add Error ** to sev_kvm_init()
From: |
David Gibson |
Subject: |
[for-6.0 v5 07/13] sev: Add Error ** to sev_kvm_init() |
Date: |
Fri, 4 Dec 2020 16:44:09 +1100 |
This allows failures to be reported richly and idiomatically.
Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
---
accel/kvm/kvm-all.c | 4 +++-
accel/kvm/sev-stub.c | 5 +++--
include/sysemu/sev.h | 2 +-
target/i386/sev.c | 31 +++++++++++++++----------------
4 files changed, 22 insertions(+), 20 deletions(-)
diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c
index c6bd7b9d02..724e9294d0 100644
--- a/accel/kvm/kvm-all.c
+++ b/accel/kvm/kvm-all.c
@@ -2183,9 +2183,11 @@ static int kvm_init(MachineState *ms)
* encryption context.
*/
if (ms->sgm) {
+ Error *local_err = NULL;
/* FIXME handle mechanisms other than SEV */
- ret = sev_kvm_init(ms->sgm);
+ ret = sev_kvm_init(ms->sgm, &local_err);
if (ret < 0) {
+ error_report_err(local_err);
goto err;
}
}
diff --git a/accel/kvm/sev-stub.c b/accel/kvm/sev-stub.c
index 3df3c88eeb..537c91d9f8 100644
--- a/accel/kvm/sev-stub.c
+++ b/accel/kvm/sev-stub.c
@@ -15,7 +15,8 @@
#include "qemu-common.h"
#include "sysemu/sev.h"
-int sev_kvm_init(SecurableGuestMemory *sgm)
+int sev_kvm_init(SecurableGuestMemory *sgm, Error **errp)
{
- return -1;
+ /* SEV can't be selected if it's not compiled */
+ g_assert_not_reached();
}
diff --git a/include/sysemu/sev.h b/include/sysemu/sev.h
index 36d038a36f..7aa35821f0 100644
--- a/include/sysemu/sev.h
+++ b/include/sysemu/sev.h
@@ -17,6 +17,6 @@
#include "sysemu/kvm.h"
#include "exec/securable-guest-memory.h"
-int sev_kvm_init(SecurableGuestMemory *sgm);
+int sev_kvm_init(SecurableGuestMemory *sgm, Error **errp);
#endif
diff --git a/target/i386/sev.c b/target/i386/sev.c
index 7b8ce590f7..7333a60dc0 100644
--- a/target/i386/sev.c
+++ b/target/i386/sev.c
@@ -626,7 +626,7 @@ sev_vm_state_change(void *opaque, int running, RunState
state)
}
}
-int sev_kvm_init(SecurableGuestMemory *sgm)
+int sev_kvm_init(SecurableGuestMemory *sgm, Error **errp)
{
SevGuestState *sev = SEV_GUEST(sgm);
char *devname;
@@ -648,14 +648,14 @@ int sev_kvm_init(SecurableGuestMemory *sgm)
host_cbitpos = ebx & 0x3f;
if (host_cbitpos != sev->cbitpos) {
- error_report("%s: cbitpos check failed, host '%d' requested '%d'",
- __func__, host_cbitpos, sev->cbitpos);
+ error_setg(errp, "%s: cbitpos check failed, host '%d' requested '%d'",
+ __func__, host_cbitpos, sev->cbitpos);
goto err;
}
if (sev->reduced_phys_bits < 1) {
- error_report("%s: reduced_phys_bits check failed, it should be >=1,"
- " requested '%d'", __func__, sev->reduced_phys_bits);
+ error_setg(errp, "%s: reduced_phys_bits check failed, it should be
>=1,"
+ " requested '%d'", __func__, sev->reduced_phys_bits);
goto err;
}
@@ -664,20 +664,19 @@ int sev_kvm_init(SecurableGuestMemory *sgm)
devname = object_property_get_str(OBJECT(sev), "sev-device", NULL);
sev->sev_fd = open(devname, O_RDWR);
if (sev->sev_fd < 0) {
- error_report("%s: Failed to open %s '%s'", __func__,
- devname, strerror(errno));
- }
- g_free(devname);
- if (sev->sev_fd < 0) {
+ error_setg(errp, "%s: Failed to open %s '%s'", __func__,
+ devname, strerror(errno));
+ g_free(devname);
goto err;
}
+ g_free(devname);
ret = sev_platform_ioctl(sev->sev_fd, SEV_PLATFORM_STATUS, &status,
&fw_error);
if (ret) {
- error_report("%s: failed to get platform status ret=%d "
- "fw_error='%d: %s'", __func__, ret, fw_error,
- fw_error_to_str(fw_error));
+ error_setg(errp, "%s: failed to get platform status ret=%d "
+ "fw_error='%d: %s'", __func__, ret, fw_error,
+ fw_error_to_str(fw_error));
goto err;
}
sev->build_id = status.build;
@@ -687,14 +686,14 @@ int sev_kvm_init(SecurableGuestMemory *sgm)
trace_kvm_sev_init();
ret = sev_ioctl(sev->sev_fd, KVM_SEV_INIT, NULL, &fw_error);
if (ret) {
- error_report("%s: failed to initialize ret=%d fw_error=%d '%s'",
- __func__, ret, fw_error, fw_error_to_str(fw_error));
+ error_setg(errp, "%s: failed to initialize ret=%d fw_error=%d '%s'",
+ __func__, ret, fw_error, fw_error_to_str(fw_error));
goto err;
}
ret = sev_launch_start(sev);
if (ret) {
- error_report("%s: failed to create encryption context", __func__);
+ error_setg(errp, "%s: failed to create encryption context", __func__);
goto err;
}
--
2.28.0
- Re: [for-6.0 v5 12/13] securable guest memory: Alter virtio default properties for protected guests, (continued)
- Re: [for-6.0 v5 12/13] securable guest memory: Alter virtio default properties for protected guests, Christian Borntraeger, 2020/12/04
- Re: [for-6.0 v5 12/13] securable guest memory: Alter virtio default properties for protected guests, Cornelia Huck, 2020/12/04
- Re: [for-6.0 v5 12/13] securable guest memory: Alter virtio default properties for protected guests, Christian Borntraeger, 2020/12/04
- Re: [for-6.0 v5 12/13] securable guest memory: Alter virtio default properties for protected guests, Halil Pasic, 2020/12/04
- Re: [for-6.0 v5 12/13] securable guest memory: Alter virtio default properties for protected guests, David Gibson, 2020/12/07
- Re: [for-6.0 v5 12/13] securable guest memory: Alter virtio default properties for protected guests, Christian Borntraeger, 2020/12/08
- Re: [for-6.0 v5 12/13] securable guest memory: Alter virtio default properties for protected guests, Halil Pasic, 2020/12/08
- Re: [for-6.0 v5 12/13] securable guest memory: Alter virtio default properties for protected guests, Cornelia Huck, 2020/12/08
- Re: [for-6.0 v5 12/13] securable guest memory: Alter virtio default properties for protected guests, David Gibson, 2020/12/17
Re: [for-6.0 v5 12/13] securable guest memory: Alter virtio default properties for protected guests, Cornelia Huck, 2020/12/04
[for-6.0 v5 07/13] sev: Add Error ** to sev_kvm_init(),
David Gibson <=
[for-6.0 v5 10/13] spapr: Add PEF based securable guest memory, David Gibson, 2020/12/04
[for-6.0 v5 05/13] securable guest memory: Rework the "memory-encryption" property, David Gibson, 2020/12/04
[for-6.0 v5 13/13] s390: Recognize securable-guest-memory option, David Gibson, 2020/12/04
Re: [for-6.0 v5 00/13] Generalize memory encryption models, Christian Borntraeger, 2020/12/04