From: Ashish Kalra <ashish.kalra@amd.com>
To: dgilbert@redhat.com, pbonzini@redhat.com, qemu-devel@nongnu.org
Cc: thomas.lendacky@amd.com, jon.grimm@amd.com, brijesh.singh@amd.com
Subject: SEV guest debugging support for Qemu
Date: Tue, 22 Sep 2020 20:11:24 +0000 [thread overview]
Message-ID: <20200922201124.GA6606@ashkalra_ubuntu_server> (raw)
Hello Alan, Paolo,
I am following up on Brijesh’s patches for SEV guest debugging support for Qemu using gdb and/or qemu monitor.
I believe that last time, Qemu SEV debug patches were not applied and have attached the link to the email thread and Paolo’s feedback below for reference [1].
I wanted to re-start a discussion on the same here with the Qemu community and seek the feedback on the approaches which we are considering :
Looking at Qemu code, I see the following interface is defined, for virtual memory access for debug : cpu_memory_rw_debug().
Both gdbstub (target_memory_rw_debug() ) and QMP/HMP (monitor/misc.c : memory_dump() ) use this standard and well-defined interface to access guest memory for debugging purposes.
This internally invokes the address_space_rw() accessor functions which we had "fixed" internally (as part of the earlier patch) to invoke memory region specific debug ops.
In our earlier approach we were adding debug ops/callbacks to memory regions and as per comments on our earlier patches, Paolo was not happy with this debug API for
MemoryRegions and hence the SEV support for Qemu was merged without the debug support.
Now, we want to reuse this cpu_memory_rw_debug() interface or alternatively introduce a new generic debug interface/object in the Qemu. This
debug interface should be controlled through the global machine policy.
For e.g.,
# $QEMU -machine -debug=<a debug object>
or
# $QEMU -machine -debug=sev-guest-debug
The QMP and GDB access will be updated to use the generic debug interface. The generic debug interface or the cpu_memory_rw_debug() interace will introduce hooks to call a
vendor specific debug object to delegate accessing the data. The vendor specific debug object may do a further checks before and after accessing the memory.
Now, looking specifically at cpu_memory_rw_debug() interface, this interface is invoked for all guest memory accesses for debugging purposes and it also does
guest VA to GPA translation via cpu_get_phys_page_attrs_debug(), so we can again add a vendor specific callback here to do guest VA to GPA translations specific
to SEV as SEV guest debugging will also require accessing guest page table entries and decrypting them via the SEV DBG_DECRYPT APIs and additionally clearing
the C-bit on page table entries (PxEs) before using them further for page table walks.
There is still an issue with the generic cpu_memory_rw_debug() interface, though it is used for all guest memory accesses for debugging and we can also handle
guest page table walks via it (as mentioned above), there are still other gdb/monitor commands such as tlb_info_xx() and mem_info_xx() which also do guest page
table walks, but they don’t go through any generic guest memory access/debug interface, so these commands will need to be handled additionally for SEV.
The vendor specific debug object (added as a hook to generic debug object or the generic cpu_memory_rw_debug() interface) will do further checks before and after accessing the memory.
e.g., in the case of SEV,
1. Check the guest policy, if guest policy does not allow debug then return an error.
2. If its an MMIO region then access the data.
3. If its RAM region then call the PSP commands to decrypt the data.
4. If caller asked to read the PTE entry then probably clear the C-bits after reading the PTE entry.
5. many more checks
Looking fwd. to your feedback/comments on the above approach or other any other suggestions.
Thanks,
Ashish
[1] -> http://next.patchew.org/QEMU/20180308124901.83533-1-brijesh.singh@amd.com/20180308124901.83533-29-brijesh.singh@amd.com/
next reply other threads:[~2020-09-22 20:58 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-09-22 20:11 Ashish Kalra [this message]
2020-09-24 13:53 ` SEV guest debugging support for Qemu Dr. David Alan Gilbert
2020-09-24 19:06 ` Ashish Kalra
2020-09-24 19:37 ` Brijesh Singh
2020-09-24 21:52 ` Ashish Kalra
2020-09-25 8:39 ` Dr. David Alan Gilbert
2020-09-25 8:51 ` Paolo Bonzini
2020-09-25 20:46 ` Ashish Kalra
2020-09-25 20:56 ` Paolo Bonzini
2020-09-25 23:48 ` Ashish Kalra
2020-09-26 0:02 ` Paolo Bonzini
2020-09-28 13:26 ` Ashish Kalra
2020-09-28 18:08 ` Paolo Bonzini
-- strict thread matches above, loose matches on Subject: below --
2020-09-22 19:45 Kalra, Ashish
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200922201124.GA6606@ashkalra_ubuntu_server \
--to=ashish.kalra@amd.com \
--cc=brijesh.singh@amd.com \
--cc=dgilbert@redhat.com \
--cc=jon.grimm@amd.com \
--cc=pbonzini@redhat.com \
--cc=qemu-devel@nongnu.org \
--cc=thomas.lendacky@amd.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).