On 7/11/2024 10:23 AM, Peter Gonda wrote:
+static void test_sev_launch(void *guest_code, uint32_t type, uint64_t policy) +{
struct kvm_vcpu *vcpu;struct kvm_vm *vm;struct ucall uc;bool cond;int ret;vm = vm_sev_create_with_one_vcpu(type, guest_code, &vcpu);ret = sev_vm_launch_start(vm, 0);cond = type == KVM_X86_SEV_VM ? !ret : ret;TEST_ASSERT(cond,"KVM_SEV_LAUNCH_START should fail, invalid policy.");ret = sev_vm_launch_update(vm, policy);cond = type == KVM_X86_SEV_VM ? !ret : ret;TEST_ASSERT(cond,"KVM_SEV_LAUNCH_UPDATE should fail, invalid policy.");Isn't the reason we expect all other calls to fail here because we have not successfully called `sev_vm_launch_start()`?
Yes you're right. The idea is that none of the consequent "good" ioctl calls should succeed if the vm_launch_start was faulty.
sev_guest_status_assert(vm, type);ret = sev_vm_launch_measure(vm, alloca(256));Should we free this buffer?
Sure, I should store this into a pointer and free it.
I guess this also happens within vm_sev_launch() where we should include a free as well.
Thanks for catching this!