ec78e2cda3
While we've abstracted some (potential) differences between mechanisms for securing guest memory, the initialization is still specific to SEV. Given that, move it into x86's kvm_arch_init() code, rather than the generic kvm_init() code. Signed-off-by: David Gibson <david@gibson.dropbear.id.au> Reviewed-by: Cornelia Huck <cohuck@redhat.com> Reviewed-by: Greg Kurz <groug@kaod.org>
23 lines
476 B
C
23 lines
476 B
C
/*
|
|
* QEMU SEV stub
|
|
*
|
|
* Copyright Advanced Micro Devices 2018
|
|
*
|
|
* Authors:
|
|
* Brijesh Singh <brijesh.singh@amd.com>
|
|
*
|
|
* This work is licensed under the terms of the GNU GPL, version 2 or later.
|
|
* See the COPYING file in the top-level directory.
|
|
*
|
|
*/
|
|
|
|
#include "qemu/osdep.h"
|
|
#include "qemu-common.h"
|
|
#include "sysemu/sev.h"
|
|
|
|
int sev_kvm_init(ConfidentialGuestSupport *cgs, Error **errp)
|
|
{
|
|
/* If we get here, cgs must be some non-SEV thing */
|
|
return 0;
|
|
}
|