Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openeuler
qemu
提交
bf3175b4
Q
qemu
项目概览
openeuler
/
qemu
通知
10
Star
0
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
Q
qemu
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
提交
bf3175b4
编写于
4月 27, 2018
作者:
P
Paolo Bonzini
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
target/i386: sev: fix memory leaks
Reported by Coverity. Signed-off-by:
N
Paolo Bonzini
<
pbonzini@redhat.com
>
上级
950c4e6c
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
17 addition
and
15 deletion
+17
-15
target/i386/sev.c
target/i386/sev.c
+17
-15
未找到文件。
target/i386/sev.c
浏览文件 @
bf3175b4
...
...
@@ -430,7 +430,8 @@ static int
sev_get_pdh_info
(
int
fd
,
guchar
**
pdh
,
size_t
*
pdh_len
,
guchar
**
cert_chain
,
size_t
*
cert_chain_len
)
{
guchar
*
pdh_data
,
*
cert_chain_data
;
guchar
*
pdh_data
=
NULL
;
guchar
*
cert_chain_data
=
NULL
;
struct
sev_user_data_pdh_cert_export
export
=
{};
int
err
,
r
;
...
...
@@ -471,8 +472,9 @@ e_free:
SevCapability
*
sev_get_capabilities
(
void
)
{
SevCapability
*
cap
;
guchar
*
pdh_data
,
*
cert_chain_data
;
SevCapability
*
cap
=
NULL
;
guchar
*
pdh_data
=
NULL
;
guchar
*
cert_chain_data
=
NULL
;
size_t
pdh_len
=
0
,
cert_chain_len
=
0
;
uint32_t
ebx
;
int
fd
;
...
...
@@ -486,7 +488,7 @@ sev_get_capabilities(void)
if
(
sev_get_pdh_info
(
fd
,
&
pdh_data
,
&
pdh_len
,
&
cert_chain_data
,
&
cert_chain_len
))
{
return
NULL
;
goto
out
;
}
cap
=
g_new0
(
SevCapability
,
1
);
...
...
@@ -502,9 +504,9 @@ sev_get_capabilities(void)
*/
cap
->
reduced_phys_bits
=
1
;
out:
g_free
(
pdh_data
);
g_free
(
cert_chain_data
);
close
(
fd
);
return
cap
;
}
...
...
@@ -530,7 +532,7 @@ sev_launch_start(SEVState *s)
{
gsize
sz
;
int
ret
=
1
;
int
fw_error
;
int
fw_error
,
rc
;
QSevGuestInfo
*
sev
=
s
->
sev_info
;
struct
kvm_sev_launch_start
*
start
;
guchar
*
session
=
NULL
,
*
dh_cert
=
NULL
;
...
...
@@ -543,7 +545,7 @@ sev_launch_start(SEVState *s)
&
error_abort
);
if
(
sev
->
session_file
)
{
if
(
sev_read_file_base64
(
sev
->
session_file
,
&
session
,
&
sz
)
<
0
)
{
return
1
;
goto
out
;
}
start
->
session_uaddr
=
(
unsigned
long
)
session
;
start
->
session_len
=
sz
;
...
...
@@ -551,18 +553,18 @@ sev_launch_start(SEVState *s)
if
(
sev
->
dh_cert_file
)
{
if
(
sev_read_file_base64
(
sev
->
dh_cert_file
,
&
dh_cert
,
&
sz
)
<
0
)
{
return
1
;
goto
out
;
}
start
->
dh_uaddr
=
(
unsigned
long
)
dh_cert
;
start
->
dh_len
=
sz
;
}
trace_kvm_sev_launch_start
(
start
->
policy
,
session
,
dh_cert
);
r
et
=
sev_ioctl
(
s
->
sev_fd
,
KVM_SEV_LAUNCH_START
,
start
,
&
fw_error
);
if
(
r
et
<
0
)
{
r
c
=
sev_ioctl
(
s
->
sev_fd
,
KVM_SEV_LAUNCH_START
,
start
,
&
fw_error
);
if
(
r
c
<
0
)
{
error_report
(
"%s: LAUNCH_START ret=%d fw_error=%d '%s'"
,
__func__
,
ret
,
fw_error
,
fw_error_to_str
(
fw_error
));
return
1
;
goto
out
;
}
object_property_set_int
(
OBJECT
(
sev
),
start
->
handle
,
"handle"
,
...
...
@@ -570,12 +572,13 @@ sev_launch_start(SEVState *s)
sev_set_guest_state
(
SEV_STATE_LAUNCH_UPDATE
);
s
->
handle
=
start
->
handle
;
s
->
policy
=
start
->
policy
;
ret
=
0
;
out:
g_free
(
start
);
g_free
(
session
);
g_free
(
dh_cert
);
return
0
;
return
ret
;
}
static
int
...
...
@@ -712,7 +715,7 @@ sev_guest_init(const char *id)
uint32_t
host_cbitpos
;
struct
sev_user_data_status
status
=
{};
s
=
g_new0
(
SEVState
,
1
);
s
ev_state
=
s
=
g_new0
(
SEVState
,
1
);
s
->
sev_info
=
lookup_sev_guest_info
(
id
);
if
(
!
s
->
sev_info
)
{
error_report
(
"%s: '%s' is not a valid '%s' object"
,
...
...
@@ -720,7 +723,6 @@ sev_guest_init(const char *id)
goto
err
;
}
sev_state
=
s
;
s
->
state
=
SEV_STATE_UNINIT
;
host_cpuid
(
0x8000001F
,
0
,
NULL
,
&
ebx
,
NULL
,
NULL
);
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录