[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <cover.1742477213.git.thomas.lendacky@amd.com>
Date: Thu, 20 Mar 2025 08:26:48 -0500
From: Tom Lendacky <thomas.lendacky@....com>
To: <kvm@...r.kernel.org>, <linux-kernel@...r.kernel.org>, <x86@...nel.org>
CC: Paolo Bonzini <pbonzini@...hat.com>, Sean Christopherson
<seanjc@...gle.com>, Borislav Petkov <bp@...en8.de>, Dave Hansen
<dave.hansen@...ux.intel.com>, Ingo Molnar <mingo@...hat.com>, "Thomas
Gleixner" <tglx@...utronix.de>, Michael Roth <michael.roth@....com>
Subject: [PATCH 0/5] Provide SEV-ES/SEV-SNP support for decrypting the VMSA
This series adds support for decrypting an SEV-ES/SEV-SNP VMSA in
dump_vmcb() when the guest policy allows debugging.
It also contains some updates to dump_vmcb() to dump additional guest
register state, print the type of guest, print the vCPU id, and adds a
mutex to prevent interleaving of the dump_vmcb() messages when multiple
vCPU threads call dump_vmcb(). These last patches can be dropped if not
desired.
The series is based off of and tested against the KVM tree:
https://git.kernel.org/pub/scm/virt/kvm/kvm.git next
e335300095c3 ("Merge tag 'loongarch-kvm-6.15' of git://git...")
Tom Lendacky (5):
KVM: SVM: Decrypt SEV VMSA in dump_vmcb() if debugging is enabled
KVM: SVM: Dump guest register state in dump_vmcb()
KVM: SVM: Add the type of VM for which the VMCB/VMSA is being dumped
KVM: SVM: Include the vCPU ID when dumping a VMCB
KVM: SVM: Add a mutex to dump_vmcb() to prevent concurrent output
arch/x86/kvm/svm/sev.c | 98 ++++++++++++++++++++++++++++++++++++++++++
arch/x86/kvm/svm/svm.c | 80 +++++++++++++++++++++++++++++++++-
arch/x86/kvm/svm/svm.h | 11 +++++
3 files changed, 187 insertions(+), 2 deletions(-)
base-commit: e335300095c370149aada9783df2d7bf5b0db7c7
--
2.46.2
Powered by blists - more mailing lists