CINXE.COM

LKML: Tom Lendacky: Re: [PATCH 1/5] KVM: SVM: Decrypt SEV VMSA in dump_vmcb() if debugging is enabled

<?xml version="1.0" encoding="UTF-8" standalone="yes"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>LKML: Tom Lendacky: Re: [PATCH 1/5] KVM: SVM: Decrypt SEV VMSA in dump_vmcb() if debugging is enabled</title><link href="/css/message.css" rel="stylesheet" type="text/css" /><link href="/css/wrap.css" rel="alternate stylesheet" type="text/css" title="wrap" /><link href="/css/nowrap.css" rel="stylesheet" type="text/css" title="nowrap" /><link href="/favicon.ico" rel="shortcut icon" /><script src="/js/simple-calendar.js" type="text/javascript"></script><script src="/js/styleswitcher.js" type="text/javascript"></script><link rel="alternate" type="application/rss+xml" title="lkml.org : last 100 messages" href="/rss.php" /><link rel="alternate" type="application/rss+xml" title="lkml.org : last messages by Tom Lendacky" href="/groupie.php?aid=" /><!--Matomo--><script> var _paq = window._paq = window._paq || []; /* tracker methods like "setCustomDimension" should be called before "trackPageView" */ _paq.push(["setDoNotTrack", true]); _paq.push(["disableCookies"]); _paq.push(['trackPageView']); _paq.push(['enableLinkTracking']); (function() { var u="//m.lkml.org/"; _paq.push(['setTrackerUrl', u+'matomo.php']); _paq.push(['setSiteId', '1']); var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0]; g.async=true; g.src=u+'matomo.js'; s.parentNode.insertBefore(g,s); })(); </script><!--End Matomo Code--></head><body onload="es.jasper.simpleCalendar.init();" itemscope="itemscope" itemtype="http://schema.org/BlogPosting"><table border="0" cellpadding="0" cellspacing="0"><tr><td width="180" align="center"><a href="/"><img style="border:0;width:135px;height:32px" src="/images/toprowlk.gif" alt="lkml.org" /></a></td><td width="32">聽</td><td class="nb"><div><a class="nb" href="/lkml"> [lkml]</a> 聽 <a class="nb" href="/lkml/2025"> [2025]</a> 聽 <a class="nb" href="/lkml/2025/3"> [Mar]</a> 聽 <a class="nb" href="/lkml/2025/3/21"> [21]</a> 聽 <a class="nb" href="/lkml/last100"> [last100]</a> 聽 <a href="/rss.php"><img src="/images/rss-or.gif" border="0" alt="RSS Feed" /></a></div><div>Views: <a href="#" class="nowrap" onclick="setActiveStyleSheet('wrap');return false;">[wrap]</a><a href="#" class="wrap" onclick="setActiveStyleSheet('nowrap');return false;">[no wrap]</a> 聽 <a class="nb" href="/lkml/mheaders/2025/3/21/877" onclick="this.href='/lkml/headers'+'/2025/3/21/877';">[headers]</a>聽 <a href="/lkml/bounce/2025/3/21/877">[forward]</a>聽 </div></td><td width="32">聽</td></tr><tr><td valign="top"><div class="es-jasper-simpleCalendar" baseurl="/lkml/"></div><div class="threadlist">Messages in this thread</div><ul class="threadlist"><li class="root"><a href="/lkml/2025/3/20/741">First message in thread</a></li><li><a href="/lkml/2025/3/20/741">Tom Lendacky</a><ul><li><a href="/lkml/2025/3/20/736">Tom Lendacky</a><ul><li class="origin"><a href="/lkml/2025/3/21/887">Tom Lendacky</a><ul><li><a href="/lkml/2025/3/21/887">Tom Lendacky</a></li></ul></li></ul></li><li><a href="/lkml/2025/3/20/737">Tom Lendacky</a></li><li><a href="/lkml/2025/3/20/738">Tom Lendacky</a></li><li><a href="/lkml/2025/3/20/739">Tom Lendacky</a></li><li><a href="/lkml/2025/3/20/744">Tom Lendacky</a></li><li><a href="/lkml/2025/3/20/827">Borislav Petkov</a><ul><li><a href="/lkml/2025/3/21/1243">Kim Phillips</a></li></ul></li></ul></li></ul></td><td width="32" rowspan="2" class="c" valign="top"><img src="/images/icornerl.gif" width="32" height="32" alt="/" /></td><td class="c" rowspan="2" valign="top" style="padding-top: 1em"><table><tr><td><table><tr><td class="lp">Date</td><td class="rp" itemprop="datePublished">Fri, 21 Mar 2025 09:36:59 -0500</td></tr><tr><td class="lp">Subject</td><td class="rp" itemprop="name">Re: [PATCH 1/5] KVM: SVM: Decrypt SEV VMSA in dump_vmcb() if debugging is enabled</td></tr><tr><td class="lp">From</td><td class="rp" itemprop="author">Tom Lendacky &lt;&gt;</td></tr></table></td><td></td></tr></table><pre itemprop="articleBody">On 3/20/25 08:26, Tom Lendacky wrote:<br />&gt; An SEV-ES/SEV-SNP VM save area (VMSA) can be decrypted if the guest<br />&gt; policy allows debugging. Update the dump_vmcb() routine to output<br />&gt; some of the SEV VMSA contents if possible. This can be useful for<br />&gt; debug purposes.<br />&gt; <br />&gt; Signed-off-by: Tom Lendacky &lt;thomas.lendacky&#64;amd.com&gt;<br />&gt; ---<br />&gt; arch/x86/kvm/svm/sev.c | 98 ++++++++++++++++++++++++++++++++++++++++++<br />&gt; arch/x86/kvm/svm/svm.c | 13 ++++++<br />&gt; arch/x86/kvm/svm/svm.h | 11 +++++<br />&gt; 3 files changed, 122 insertions(+)<br />&gt; <br />&gt; diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c<br />&gt; index 661108d65ee7..6e3f5042d9ce 100644<br />&gt; --- a/arch/x86/kvm/svm/sev.c<br />&gt; +++ b/arch/x86/kvm/svm/sev.c<br />&gt; &#64;&#64; -563,6 +563,8 &#64;&#64; static int sev_launch_start(struct kvm *kvm, struct kvm_sev_cmd *argp)<br />&gt; if (copy_from_user(&amp;params, u64_to_user_ptr(argp-&gt;data), sizeof(params)))<br />&gt; return -EFAULT;<br />&gt; <br />&gt; + sev-&gt;policy = params.policy;<br />&gt; +<br />&gt; memset(&amp;start, 0, sizeof(start));<br />&gt; <br />&gt; dh_blob = NULL;<br />&gt; &#64;&#64; -2220,6 +2222,8 &#64;&#64; static int snp_launch_start(struct kvm *kvm, struct kvm_sev_cmd *argp)<br />&gt; if (params.policy &amp; SNP_POLICY_MASK_SINGLE_SOCKET)<br />&gt; return -EINVAL;<br />&gt; <br />&gt; + sev-&gt;policy = params.policy;<br />&gt; +<br />&gt; sev-&gt;snp_context = snp_context_create(kvm, argp);<br />&gt; if (!sev-&gt;snp_context)<br />&gt; return -ENOTTY;<br />&gt; &#64;&#64; -4975,3 +4979,97 &#64;&#64; int sev_private_max_mapping_level(struct kvm *kvm, kvm_pfn_t pfn)<br />&gt; <br />&gt; return level;<br />&gt; }<br />&gt; +<br />&gt; +struct vmcb_save_area *sev_decrypt_vmsa(struct kvm_vcpu *vcpu)<br />&gt; +{<br />&gt; + struct vcpu_svm *svm = to_svm(vcpu);<br />&gt; + struct vmcb_save_area *vmsa;<br />&gt; + struct kvm_sev_info *sev;<br />&gt; + int error = 0;<br />&gt; + int ret;<br />&gt; +<br />&gt; + if (!sev_es_guest(vcpu-&gt;kvm))<br />&gt; + return NULL;<br />&gt; +<br />&gt; + /*<br />&gt; + * If the VMSA has not yet been encrypted, return a pointer to the<br />&gt; + * current un-encrypted VMSA.<br />&gt; + */<br />&gt; + if (!vcpu-&gt;arch.guest_state_protected)<br />&gt; + return (struct vmcb_save_area *)svm-&gt;sev_es.vmsa;<br />&gt; +<br />&gt; + sev = to_kvm_sev_info(vcpu-&gt;kvm);<br />&gt; +<br />&gt; + /* Check if the SEV policy allows debugging */<br />&gt; + if (sev_snp_guest(vcpu-&gt;kvm)) {<br />&gt; + if (!(sev-&gt;policy &amp; SNP_POLICY_DEBUG))<br />&gt; + return NULL;<br />&gt; + } else {<br />&gt; + if (sev-&gt;policy &amp; SEV_POLICY_NODBG)<br />&gt; + return NULL;<br />&gt; + }<br />&gt; +<br />&gt; + if (sev_snp_guest(vcpu-&gt;kvm)) {<br />&gt; + struct sev_data_snp_dbg dbg = {0};<br />&gt; +<br />&gt; + vmsa = snp_alloc_firmware_page(__GFP_ZERO);<br />&gt; + if (!vmsa)<br />&gt; + return NULL;<br />&gt; +<br />&gt; + dbg.gctx_paddr = __psp_pa(sev-&gt;snp_context);<br />&gt; + dbg.src_addr = svm-&gt;vmcb-&gt;control.vmsa_pa;<br />&gt; + dbg.dst_addr = __psp_pa(vmsa);<br />&gt; +<br />&gt; + ret = sev_issue_cmd(vcpu-&gt;kvm, SEV_CMD_SNP_DBG_DECRYPT, &amp;dbg, &amp;error);<br />&gt; +<br />&gt; + /*<br />&gt; + * Return the target page to a hypervisor page no matter what.<br />&gt; + * If this fails, the page can't be used, so leak it and don't<br />&gt; + * try to use it.<br />&gt; + */<br />&gt; + if (snp_page_reclaim(vcpu-&gt;kvm, PHYS_PFN(__pa(vmsa))))<br />&gt; + return NULL;<br /><br />And actually I should call snp_leak_pages() here to record that. I'll add<br />that to the next version.<br /><br />Thanks,<br />Tom<br /><br />&gt; +<br />&gt; + if (ret) {<br />&gt; + pr_err("SEV: SNP_DBG_DECRYPT failed ret=%d, fw_error=%d (%#x)\n",<br />&gt; + ret, error, error);<br />&gt; + free_page((unsigned long)vmsa);<br />&gt; +<br />&gt; + return NULL;<br />&gt; + }<br />&gt; + } else {<br />&gt; + struct sev_data_dbg dbg = {0};<br />&gt; + struct page *vmsa_page;<br />&gt; +<br />&gt; + vmsa_page = alloc_page(GFP_KERNEL);<br />&gt; + if (!vmsa_page)<br />&gt; + return NULL;<br />&gt; +<br />&gt; + vmsa = page_address(vmsa_page);<br />&gt; +<br />&gt; + dbg.handle = sev-&gt;handle;<br />&gt; + dbg.src_addr = svm-&gt;vmcb-&gt;control.vmsa_pa;<br />&gt; + dbg.dst_addr = __psp_pa(vmsa);<br />&gt; + dbg.len = PAGE_SIZE;<br />&gt; +<br />&gt; + ret = sev_issue_cmd(vcpu-&gt;kvm, SEV_CMD_DBG_DECRYPT, &amp;dbg, &amp;error);<br />&gt; + if (ret) {<br />&gt; + pr_err("SEV: SEV_CMD_DBG_DECRYPT failed ret=%d, fw_error=%d (0x%x)\n",<br />&gt; + ret, error, error);<br />&gt; + __free_page(vmsa_page);<br />&gt; +<br />&gt; + return NULL;<br />&gt; + }<br />&gt; + }<br />&gt; +<br />&gt; + return vmsa;<br />&gt; +}<br />&gt; +<br />&gt; +void sev_free_decrypted_vmsa(struct kvm_vcpu *vcpu, struct vmcb_save_area *vmsa)<br />&gt; +{<br />&gt; + /* If the VMSA has not yet been encrypted, nothing was allocated */<br />&gt; + if (!vcpu-&gt;arch.guest_state_protected || !vmsa)<br />&gt; + return;<br />&gt; +<br />&gt; + free_page((unsigned long)vmsa);<br />&gt; +}<br />&gt; diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c<br />&gt; index e67de787fc71..21477871073c 100644<br />&gt; --- a/arch/x86/kvm/svm/svm.c<br />&gt; +++ b/arch/x86/kvm/svm/svm.c<br />&gt; &#64;&#64; -3423,6 +3423,15 &#64;&#64; static void dump_vmcb(struct kvm_vcpu *vcpu)<br />&gt; pr_err("%-20s%016llx\n", "avic_logical_id:", control-&gt;avic_logical_id);<br />&gt; pr_err("%-20s%016llx\n", "avic_physical_id:", control-&gt;avic_physical_id);<br />&gt; pr_err("%-20s%016llx\n", "vmsa_pa:", control-&gt;vmsa_pa);<br />&gt; +<br />&gt; + if (sev_es_guest(vcpu-&gt;kvm)) {<br />&gt; + save = sev_decrypt_vmsa(vcpu);<br />&gt; + if (!save)<br />&gt; + goto no_vmsa;<br />&gt; +<br />&gt; + save01 = save;<br />&gt; + }<br />&gt; +<br />&gt; pr_err("VMCB State Save Area:\n");<br />&gt; pr_err("%-5s s: %04x a: %04x l: %08x b: %016llx\n",<br />&gt; "es:",<br />&gt; &#64;&#64; -3493,6 +3502,10 &#64;&#64; static void dump_vmcb(struct kvm_vcpu *vcpu)<br />&gt; pr_err("%-15s %016llx %-13s %016llx\n",<br />&gt; "excp_from:", save-&gt;last_excp_from,<br />&gt; "excp_to:", save-&gt;last_excp_to);<br />&gt; +<br />&gt; +no_vmsa:<br />&gt; + if (sev_es_guest(vcpu-&gt;kvm))<br />&gt; + sev_free_decrypted_vmsa(vcpu, save);<br />&gt; }<br />&gt; <br />&gt; static bool svm_check_exit_valid(u64 exit_code)<br />&gt; diff --git a/arch/x86/kvm/svm/svm.h b/arch/x86/kvm/svm/svm.h<br />&gt; index ea44c1da5a7c..66979ddc3659 100644<br />&gt; --- a/arch/x86/kvm/svm/svm.h<br />&gt; +++ b/arch/x86/kvm/svm/svm.h<br />&gt; &#64;&#64; -98,6 +98,7 &#64;&#64; struct kvm_sev_info {<br />&gt; unsigned int asid; /* ASID used for this guest */<br />&gt; unsigned int handle; /* SEV firmware handle */<br />&gt; int fd; /* SEV device fd */<br />&gt; + unsigned long policy;<br />&gt; unsigned long pages_locked; /* Number of pages locked */<br />&gt; struct list_head regions_list; /* List of registered regions */<br />&gt; u64 ap_jump_table; /* SEV-ES AP Jump Table address */<br />&gt; &#64;&#64; -114,6 +115,9 &#64;&#64; struct kvm_sev_info {<br />&gt; struct mutex guest_req_mutex; /* Must acquire before using bounce buffers */<br />&gt; };<br />&gt; <br />&gt; +#define SEV_POLICY_NODBG BIT_ULL(0)<br />&gt; +#define SNP_POLICY_DEBUG BIT_ULL(19)<br />&gt; +<br />&gt; struct kvm_svm {<br />&gt; struct kvm kvm;<br />&gt; <br />&gt; &#64;&#64; -756,6 +760,8 &#64;&#64; void sev_snp_init_protected_guest_state(struct kvm_vcpu *vcpu);<br />&gt; int sev_gmem_prepare(struct kvm *kvm, kvm_pfn_t pfn, gfn_t gfn, int max_order);<br />&gt; void sev_gmem_invalidate(kvm_pfn_t start, kvm_pfn_t end);<br />&gt; int sev_private_max_mapping_level(struct kvm *kvm, kvm_pfn_t pfn);<br />&gt; +struct vmcb_save_area *sev_decrypt_vmsa(struct kvm_vcpu *vcpu);<br />&gt; +void sev_free_decrypted_vmsa(struct kvm_vcpu *vcpu, struct vmcb_save_area *vmsa);<br />&gt; #else<br />&gt; static inline struct page *snp_safe_alloc_page_node(int node, gfp_t gfp)<br />&gt; {<br />&gt; &#64;&#64; -787,6 +793,11 &#64;&#64; static inline int sev_private_max_mapping_level(struct kvm *kvm, kvm_pfn_t pfn)<br />&gt; return 0;<br />&gt; }<br />&gt; <br />&gt; +static inline struct vmcb_save_area *sev_decrypt_vmsa(struct kvm_vcpu *vcpu)<br />&gt; +{<br />&gt; + return NULL;<br />&gt; +}<br />&gt; +static inline void sev_free_decrypted_vmsa(struct kvm_vcpu *vcpu, struct vmcb_save_area *vmsa) {}<br />&gt; #endif<br />&gt; <br />&gt; /* vmenter.S */<br /><br /></pre></td><td width="32" rowspan="2" class="c" valign="top"><img src="/images/icornerr.gif" width="32" height="32" alt="\" /></td></tr><tr><td align="right" valign="bottom"> 聽 </td></tr><tr><td align="right" valign="bottom">聽</td><td class="c" valign="bottom" style="padding-bottom: 0px"><img src="/images/bcornerl.gif" width="32" height="32" alt="\" /></td><td class="c">聽</td><td class="c" valign="bottom" style="padding-bottom: 0px"><img src="/images/bcornerr.gif" width="32" height="32" alt="/" /></td></tr><tr><td align="right" valign="top" colspan="2"> 聽 </td><td class="lm">Last update: 2025-03-21 15:39 聽聽 [W:0.125 / U:0.309 seconds]<br />漏2003-2020 <a href="http://blog.jasper.es/"><span itemprop="editor">Jasper Spaans</span></a>|hosted at <a href="https://www.digitalocean.com/?refcode=9a8e99d24cf9">Digital Ocean</a> and my Meterkast|<a href="http://blog.jasper.es/categories.html#lkml-ref">Read the blog</a></td><td>聽</td></tr></table><script language="javascript" src="/js/styleswitcher.js" type="text/javascript"></script></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10