[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Qemu-devel] [RFC PATCH v3 13/18] sev: add DEBUG_DECRYPT command
From: |
Brijesh Singh |
Subject: |
[Qemu-devel] [RFC PATCH v3 13/18] sev: add DEBUG_DECRYPT command |
Date: |
Tue, 1 Nov 2016 11:54:06 -0400 |
User-agent: |
StGit/0.17.1-dirty |
The command is used to decrypt a page of guest memory for debug.
The command will be used by qemu monitor dump and gdbserver to access
the guest memory for debug purposes. A typical usage look like:
cpu_physical_memory_rw_debug
cpu_physical_memory_rw_debug_internal
sev_debug_decrypt
Signed-off-by: Brijesh Singh <address@hidden>
---
sev.c | 28 +++++++++++++++++++++++++---
1 file changed, 25 insertions(+), 3 deletions(-)
diff --git a/sev.c b/sev.c
index ff9266a..f690a86 100644
--- a/sev.c
+++ b/sev.c
@@ -329,6 +329,28 @@ err:
}
static int
+sev_debug_decrypt(SEVState *s, uint8_t *dst, const uint8_t *src, uint32_t len)
+{
+ int ret;
+ struct kvm_sev_dbg_decrypt *dbg;
+
+ dbg = g_malloc0(sizeof(*dbg));
+ if (!dbg) {
+ return 1;
+ }
+
+ dbg->src_addr = (unsigned long)src;
+ dbg->dst_addr = (unsigned long)dst;
+ dbg->length = len;
+
+ ret = sev_ioctl(KVM_SEV_DBG_DECRYPT, dbg);
+ DPRINTF("SEV: DBG_DECRYPT src %#lx dst %#lx len %#x\n",
+ (uint64_t)src, (uint64_t)dst, len);
+ g_free(dbg);
+ return ret;
+}
+
+static int
sev_mem_write(uint8_t *dst, const uint8_t *src, uint32_t len, MemTxAttrs attrs)
{
SEVState *s = kvm_memory_encryption_get_handle();
@@ -348,9 +370,9 @@ sev_mem_read(uint8_t *dst, const uint8_t *src, uint32_t
len, MemTxAttrs attrs)
{
SEVState *s = kvm_memory_encryption_get_handle();
- assert(s != NULL && s->state != SEV_STATE_INVALID);
+ assert(attrs.debug || (s != NULL && s->state != SEV_STATE_INVALID));
- return 0;
+ return sev_debug_decrypt(s, dst, src, len);
}
static int
@@ -453,7 +475,7 @@ sev_guest_mem_dec(void *handle, uint8_t *dst, const uint8_t
*src, uint32_t len)
assert(s != NULL && s->state != SEV_STATE_INVALID);
/* use SEV debug command to decrypt memory */
- return 1;
+ return sev_debug_decrypt((SEVState *)handle, dst, src, len);
}
int
- [Qemu-devel] [RFC PATCH v3 03/18] exec: add debug version of physical memory read and write apis, (continued)
- [Qemu-devel] [RFC PATCH v3 03/18] exec: add debug version of physical memory read and write apis, Brijesh Singh, 2016/11/01
- [Qemu-devel] [RFC PATCH v3 04/18] monitor: use debug version of memory access apis, Brijesh Singh, 2016/11/01
- [Qemu-devel] [RFC PATCH v3 05/18] core: add new security-policy object, Brijesh Singh, 2016/11/01
- [Qemu-devel] [RFC PATCH v3 06/18] kvm: add memory encryption APIs, Brijesh Singh, 2016/11/01
- [Qemu-devel] [RFC PATCH v3 07/18] sev: add Secure Encrypted Virtulization (SEV) support, Brijesh Singh, 2016/11/01
- [Qemu-devel] [RFC PATCH v3 08/18] hmp: display memory encryption support in 'info kvm', Brijesh Singh, 2016/11/01
- [Qemu-devel] [RFC PATCH v3 09/18] core: loader: create memory encryption context before copying data, Brijesh Singh, 2016/11/01
- [Qemu-devel] [RFC PATCH v3 10/18] sev: add LAUNCH_START command, Brijesh Singh, 2016/11/01
- [Qemu-devel] [RFC PATCH v3 11/18] sev: add LAUNCH_UPDATE command, Brijesh Singh, 2016/11/01
- [Qemu-devel] [RFC PATCH v3 12/18] sev: add LAUNCH_FINISH command, Brijesh Singh, 2016/11/01
- [Qemu-devel] [RFC PATCH v3 13/18] sev: add DEBUG_DECRYPT command,
Brijesh Singh <=
- [Qemu-devel] [RFC PATCH v3 14/18] sev: add DEBUG_ENCRYPT command, Brijesh Singh, 2016/11/01
- [Qemu-devel] [RFC PATCH v3 16/18] target-i386: add cpuid Fn8000_001f, Brijesh Singh, 2016/11/01
- [Qemu-devel] [RFC PATCH v3 17/18] i386: clear C-bit in SEV guest page table walk, Brijesh Singh, 2016/11/01
- [Qemu-devel] [RFC PATCH v3 18/18] migration: disable save/restore and migration on SEV guest, Brijesh Singh, 2016/11/01
- [Qemu-devel] [RFC PATCH v3 15/18] i386: register memory encryption ops, Brijesh Singh, 2016/11/01
- Re: [Qemu-devel] [RFC PATCH v3 00/18] x86: Secure Encrypted Virtualization (AMD), no-reply, 2016/11/01
- Re: [Qemu-devel] [RFC PATCH v3 00/18] x86: Secure Encrypted Virtualization (AMD), no-reply, 2016/11/01