CINXE.COM

LKML: Tom Lendacky: Re: [PATCH 1/5] KVM: SVM: Decrypt SEV VMSA in dump_vmcb() if debugging is enabled

<?xml version="1.0" encoding="UTF-8" standalone="yes"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>LKML: Tom Lendacky: Re: [PATCH 1/5] KVM: SVM: Decrypt SEV VMSA in dump_vmcb() if debugging is enabled</title><link href="/css/message.css" rel="stylesheet" type="text/css" /><link href="/css/wrap.css" rel="alternate stylesheet" type="text/css" title="wrap" /><link href="/css/nowrap.css" rel="stylesheet" type="text/css" title="nowrap" /><link href="/favicon.ico" rel="shortcut icon" /><script src="/js/simple-calendar.js" type="text/javascript"></script><script src="/js/styleswitcher.js" type="text/javascript"></script><link rel="alternate" type="application/rss+xml" title="lkml.org : last 100 messages" href="/rss.php" /><link rel="alternate" type="application/rss+xml" title="lkml.org : last messages by Tom Lendacky" href="/groupie.php?aid=" /><!--Matomo--><script> var _paq = window._paq = window._paq || []; /* tracker methods like "setCustomDimension" should be called before "trackPageView" */ _paq.push(["setDoNotTrack", true]); _paq.push(["disableCookies"]); _paq.push(['trackPageView']); _paq.push(['enableLinkTracking']); (function() { var u="//m.lkml.org/"; _paq.push(['setTrackerUrl', u+'matomo.php']); _paq.push(['setSiteId', '1']); var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0]; g.async=true; g.src=u+'matomo.js'; s.parentNode.insertBefore(g,s); })(); </script><!--End Matomo Code--></head><body onload="es.jasper.simpleCalendar.init();" itemscope="itemscope" itemtype="http://schema.org/BlogPosting"><table border="0" cellpadding="0" cellspacing="0"><tr><td width="180" align="center"><a href="/"><img style="border:0;width:135px;height:32px" src="/images/toprowlk.gif" alt="lkml.org" /></a></td><td width="32">聽</td><td class="nb"><div><a class="nb" href="/lkml"> [lkml]</a> 聽 <a class="nb" href="/lkml/2025"> [2025]</a> 聽 <a class="nb" href="/lkml/2025/3"> [Mar]</a> 聽 <a class="nb" href="/lkml/2025/3/21"> [21]</a> 聽 <a class="nb" href="/lkml/last100"> [last100]</a> 聽 <a href="/rss.php"><img src="/images/rss-or.gif" border="0" alt="RSS Feed" /></a></div><div>Views: <a href="#" class="nowrap" onclick="setActiveStyleSheet('wrap');return false;">[wrap]</a><a href="#" class="wrap" onclick="setActiveStyleSheet('nowrap');return false;">[no wrap]</a> 聽 <a class="nb" href="/lkml/mheaders/2025/3/21/887" onclick="this.href='/lkml/headers'+'/2025/3/21/887';">[headers]</a>聽 <a href="/lkml/bounce/2025/3/21/887">[forward]</a>聽 </div></td><td width="32">聽</td></tr><tr><td valign="top"><div class="es-jasper-simpleCalendar" baseurl="/lkml/"></div><div class="threadlist">Messages in this thread</div><ul class="threadlist"><li class="root"><a href="/lkml/2025/3/20/741">First message in thread</a></li><li><a href="/lkml/2025/3/20/736">Tom Lendacky</a><ul><li><a href="/lkml/2025/3/21/877">Tom Lendacky</a><ul><li class="origin"><a href="">Tom Lendacky</a></li></ul></li></ul></li></ul></td><td width="32" rowspan="2" class="c" valign="top"><img src="/images/icornerl.gif" width="32" height="32" alt="/" /></td><td class="c" rowspan="2" valign="top" style="padding-top: 1em"><table><tr><td><table><tr><td class="lp">Date</td><td class="rp" itemprop="datePublished">Fri, 21 Mar 2025 09:40:11 -0500</td></tr><tr><td class="lp">Subject</td><td class="rp" itemprop="name">Re: [PATCH 1/5] KVM: SVM: Decrypt SEV VMSA in dump_vmcb() if debugging is enabled</td></tr><tr><td class="lp">From</td><td class="rp" itemprop="author">Tom Lendacky &lt;&gt;</td></tr></table></td><td></td></tr></table><pre itemprop="articleBody">On 3/21/25 09:36, Tom Lendacky wrote:<br />&gt; On 3/20/25 08:26, Tom Lendacky wrote:<br />&gt;&gt; An SEV-ES/SEV-SNP VM save area (VMSA) can be decrypted if the guest<br />&gt;&gt; policy allows debugging. Update the dump_vmcb() routine to output<br />&gt;&gt; some of the SEV VMSA contents if possible. This can be useful for<br />&gt;&gt; debug purposes.<br />&gt;&gt;<br />&gt;&gt; Signed-off-by: Tom Lendacky &lt;thomas.lendacky&#64;amd.com&gt;<br />&gt;&gt; ---<br /><br />&gt;&gt; + /*<br />&gt;&gt; + * Return the target page to a hypervisor page no matter what.<br />&gt;&gt; + * If this fails, the page can't be used, so leak it and don't<br />&gt;&gt; + * try to use it.<br />&gt;&gt; + */<br />&gt;&gt; + if (snp_page_reclaim(vcpu-&gt;kvm, PHYS_PFN(__pa(vmsa))))<br />&gt;&gt; + return NULL;<br />&gt; <br />&gt; And actually I should call snp_leak_pages() here to record that. I'll add<br />&gt; that to the next version.<br /><br />Err... snp_page_reclaim() already does that. Nevermind.<br /><br />Thanks,<br />Tom<br /><br />&gt; <br />&gt; Thanks,<br />&gt; Tom<br />&gt; <br />&gt;&gt; +<br />&gt;&gt; + if (ret) {<br />&gt;&gt; + pr_err("SEV: SNP_DBG_DECRYPT failed ret=%d, fw_error=%d (%#x)\n",<br />&gt;&gt; + ret, error, error);<br />&gt;&gt; + free_page((unsigned long)vmsa);<br />&gt;&gt; +<br />&gt;&gt; + return NULL;<br />&gt;&gt; + }<br />&gt;&gt; + } else {<br />&gt;&gt; + struct sev_data_dbg dbg = {0};<br />&gt;&gt; + struct page *vmsa_page;<br />&gt;&gt; +<br />&gt;&gt; + vmsa_page = alloc_page(GFP_KERNEL);<br />&gt;&gt; + if (!vmsa_page)<br />&gt;&gt; + return NULL;<br />&gt;&gt; +<br />&gt;&gt; + vmsa = page_address(vmsa_page);<br />&gt;&gt; +<br />&gt;&gt; + dbg.handle = sev-&gt;handle;<br />&gt;&gt; + dbg.src_addr = svm-&gt;vmcb-&gt;control.vmsa_pa;<br />&gt;&gt; + dbg.dst_addr = __psp_pa(vmsa);<br />&gt;&gt; + dbg.len = PAGE_SIZE;<br />&gt;&gt; +<br />&gt;&gt; + ret = sev_issue_cmd(vcpu-&gt;kvm, SEV_CMD_DBG_DECRYPT, &amp;dbg, &amp;error);<br />&gt;&gt; + if (ret) {<br />&gt;&gt; + pr_err("SEV: SEV_CMD_DBG_DECRYPT failed ret=%d, fw_error=%d (0x%x)\n",<br />&gt;&gt; + ret, error, error);<br />&gt;&gt; + __free_page(vmsa_page);<br />&gt;&gt; +<br />&gt;&gt; + return NULL;<br />&gt;&gt; + }<br />&gt;&gt; + }<br />&gt;&gt; +<br />&gt;&gt; + return vmsa;<br />&gt;&gt; +}<br />&gt;&gt; +<br />&gt;&gt; +void sev_free_decrypted_vmsa(struct kvm_vcpu *vcpu, struct vmcb_save_area *vmsa)<br />&gt;&gt; +{<br />&gt;&gt; + /* If the VMSA has not yet been encrypted, nothing was allocated */<br />&gt;&gt; + if (!vcpu-&gt;arch.guest_state_protected || !vmsa)<br />&gt;&gt; + return;<br />&gt;&gt; +<br />&gt;&gt; + free_page((unsigned long)vmsa);<br />&gt;&gt; +}<br />&gt;&gt; diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c<br />&gt;&gt; index e67de787fc71..21477871073c 100644<br />&gt;&gt; --- a/arch/x86/kvm/svm/svm.c<br />&gt;&gt; +++ b/arch/x86/kvm/svm/svm.c<br />&gt;&gt; &#64;&#64; -3423,6 +3423,15 &#64;&#64; static void dump_vmcb(struct kvm_vcpu *vcpu)<br />&gt;&gt; pr_err("%-20s%016llx\n", "avic_logical_id:", control-&gt;avic_logical_id);<br />&gt;&gt; pr_err("%-20s%016llx\n", "avic_physical_id:", control-&gt;avic_physical_id);<br />&gt;&gt; pr_err("%-20s%016llx\n", "vmsa_pa:", control-&gt;vmsa_pa);<br />&gt;&gt; +<br />&gt;&gt; + if (sev_es_guest(vcpu-&gt;kvm)) {<br />&gt;&gt; + save = sev_decrypt_vmsa(vcpu);<br />&gt;&gt; + if (!save)<br />&gt;&gt; + goto no_vmsa;<br />&gt;&gt; +<br />&gt;&gt; + save01 = save;<br />&gt;&gt; + }<br />&gt;&gt; +<br />&gt;&gt; pr_err("VMCB State Save Area:\n");<br />&gt;&gt; pr_err("%-5s s: %04x a: %04x l: %08x b: %016llx\n",<br />&gt;&gt; "es:",<br />&gt;&gt; &#64;&#64; -3493,6 +3502,10 &#64;&#64; static void dump_vmcb(struct kvm_vcpu *vcpu)<br />&gt;&gt; pr_err("%-15s %016llx %-13s %016llx\n",<br />&gt;&gt; "excp_from:", save-&gt;last_excp_from,<br />&gt;&gt; "excp_to:", save-&gt;last_excp_to);<br />&gt;&gt; +<br />&gt;&gt; +no_vmsa:<br />&gt;&gt; + if (sev_es_guest(vcpu-&gt;kvm))<br />&gt;&gt; + sev_free_decrypted_vmsa(vcpu, save);<br />&gt;&gt; }<br />&gt;&gt; <br />&gt;&gt; static bool svm_check_exit_valid(u64 exit_code)<br />&gt;&gt; diff --git a/arch/x86/kvm/svm/svm.h b/arch/x86/kvm/svm/svm.h<br />&gt;&gt; index ea44c1da5a7c..66979ddc3659 100644<br />&gt;&gt; --- a/arch/x86/kvm/svm/svm.h<br />&gt;&gt; +++ b/arch/x86/kvm/svm/svm.h<br />&gt;&gt; &#64;&#64; -98,6 +98,7 &#64;&#64; struct kvm_sev_info {<br />&gt;&gt; unsigned int asid; /* ASID used for this guest */<br />&gt;&gt; unsigned int handle; /* SEV firmware handle */<br />&gt;&gt; int fd; /* SEV device fd */<br />&gt;&gt; + unsigned long policy;<br />&gt;&gt; unsigned long pages_locked; /* Number of pages locked */<br />&gt;&gt; struct list_head regions_list; /* List of registered regions */<br />&gt;&gt; u64 ap_jump_table; /* SEV-ES AP Jump Table address */<br />&gt;&gt; &#64;&#64; -114,6 +115,9 &#64;&#64; struct kvm_sev_info {<br />&gt;&gt; struct mutex guest_req_mutex; /* Must acquire before using bounce buffers */<br />&gt;&gt; };<br />&gt;&gt; <br />&gt;&gt; +#define SEV_POLICY_NODBG BIT_ULL(0)<br />&gt;&gt; +#define SNP_POLICY_DEBUG BIT_ULL(19)<br />&gt;&gt; +<br />&gt;&gt; struct kvm_svm {<br />&gt;&gt; struct kvm kvm;<br />&gt;&gt; <br />&gt;&gt; &#64;&#64; -756,6 +760,8 &#64;&#64; void sev_snp_init_protected_guest_state(struct kvm_vcpu *vcpu);<br />&gt;&gt; int sev_gmem_prepare(struct kvm *kvm, kvm_pfn_t pfn, gfn_t gfn, int max_order);<br />&gt;&gt; void sev_gmem_invalidate(kvm_pfn_t start, kvm_pfn_t end);<br />&gt;&gt; int sev_private_max_mapping_level(struct kvm *kvm, kvm_pfn_t pfn);<br />&gt;&gt; +struct vmcb_save_area *sev_decrypt_vmsa(struct kvm_vcpu *vcpu);<br />&gt;&gt; +void sev_free_decrypted_vmsa(struct kvm_vcpu *vcpu, struct vmcb_save_area *vmsa);<br />&gt;&gt; #else<br />&gt;&gt; static inline struct page *snp_safe_alloc_page_node(int node, gfp_t gfp)<br />&gt;&gt; {<br />&gt;&gt; &#64;&#64; -787,6 +793,11 &#64;&#64; static inline int sev_private_max_mapping_level(struct kvm *kvm, kvm_pfn_t pfn)<br />&gt;&gt; return 0;<br />&gt;&gt; }<br />&gt;&gt; <br />&gt;&gt; +static inline struct vmcb_save_area *sev_decrypt_vmsa(struct kvm_vcpu *vcpu)<br />&gt;&gt; +{<br />&gt;&gt; + return NULL;<br />&gt;&gt; +}<br />&gt;&gt; +static inline void sev_free_decrypted_vmsa(struct kvm_vcpu *vcpu, struct vmcb_save_area *vmsa) {}<br />&gt;&gt; #endif<br />&gt;&gt; <br />&gt;&gt; /* vmenter.S */<br /><br /></pre></td><td width="32" rowspan="2" class="c" valign="top"><img src="/images/icornerr.gif" width="32" height="32" alt="\" /></td></tr><tr><td align="right" valign="bottom"> 聽 </td></tr><tr><td align="right" valign="bottom">聽</td><td class="c" valign="bottom" style="padding-bottom: 0px"><img src="/images/bcornerl.gif" width="32" height="32" alt="\" /></td><td class="c">聽</td><td class="c" valign="bottom" style="padding-bottom: 0px"><img src="/images/bcornerr.gif" width="32" height="32" alt="/" /></td></tr><tr><td align="right" valign="top" colspan="2"> 聽 </td><td class="lm">Last update: 2025-03-21 15:42 聽聽 [W:0.086 / U:1.970 seconds]<br />漏2003-2020 <a href="http://blog.jasper.es/"><span itemprop="editor">Jasper Spaans</span></a>|hosted at <a href="https://www.digitalocean.com/?refcode=9a8e99d24cf9">Digital Ocean</a> and my Meterkast|<a href="http://blog.jasper.es/categories.html#lkml-ref">Read the blog</a></td><td>聽</td></tr></table><script language="javascript" src="/js/styleswitcher.js" type="text/javascript"></script></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10