summaryrefslogtreecommitdiffstats
path: root/test
diff options
context:
space:
mode:
Diffstat (limited to 'test')
-rwxr-xr-xtest/.gitignore3
-rw-r--r--test/access-detect_guest.c4
-rw-r--r--test/access-detect_host.c183
-rw-r--r--test/aes-detect_guest.c4
-rw-r--r--test/aes-detect_host.c2
-rw-r--r--test/execstep.c632
-rw-r--r--test/fullstep.c (renamed from test/sevstep.c)27
-rwxr-xr-xtest/fulltrackbin0 -> 1326680 bytes
m---------test/libkcapi0
9 files changed, 745 insertions, 110 deletions
diff --git a/test/.gitignore b/test/.gitignore
index cf12911..b434bc4 100755
--- a/test/.gitignore
+++ b/test/.gitignore
@@ -4,7 +4,8 @@ kvm
sev
sev-es
sev-snp
-sevstep
+fullstep
+execstep
aes-detect_guest
aes-detect_host
access-detect_guest
diff --git a/test/access-detect_guest.c b/test/access-detect_guest.c
index 9fdf4ce..a54e753 100644
--- a/test/access-detect_guest.c
+++ b/test/access-detect_guest.c
@@ -19,8 +19,8 @@ main(int argc, const char **argv)
while (1) {
printf("LOOP\n");
- CPC_DO_VMMCALL(CPC_CPUID_START_TRACK, 0);
+ CPC_DO_VMMCALL(CPC_GUEST_START_TRACK, 0);
*(uint8_t *)(buf + L1_LINESIZE * 15) = 1;
- CPC_DO_VMMCALL(CPC_CPUID_STOP_TRACK, 0);
+ CPC_DO_VMMCALL(CPC_GUEST_STOP_TRACK, 0);
}
}
diff --git a/test/access-detect_host.c b/test/access-detect_host.c
index f8e9b10..87a5edd 100644
--- a/test/access-detect_host.c
+++ b/test/access-detect_host.c
@@ -140,60 +140,58 @@ monitor(bool baseline)
/* Get page fault info */
ret = ioctl(kvm_dev, KVM_CPC_POLL_EVENT, &event);
- if (!ret) {
- if (event.type == CPC_EVENT_CPUID) {
- printf("CPUID EVENT\n");
- if (event.guest.type == CPC_CPUID_START_TRACK) {
- ret = ioctl(kvm_dev, KVM_CPC_TRACK_EXEC_CUR, &inst_fault_gfn);
- if (ret) err(1, "ioctl TRACK_EXEC_CUR");
-
- printf("CPUID INST PAGE: %lu\n", inst_fault_gfn);
-
- arg = inst_fault_gfn;
- ret = ioctl(kvm_dev, KVM_CPC_TRACK_RANGE_START, &arg);
- if (ret) err(1, "ioctl TRACK_RANGE_START");
-
- arg = inst_fault_gfn+8;
- ret = ioctl(kvm_dev, KVM_CPC_TRACK_RANGE_END, &arg);
- if (ret) err(1, "ioctl TRACK_RANGE_END");
- } else if (event.guest.type == CPC_CPUID_STOP_TRACK) {
- arg = 0;
- ret = ioctl(kvm_dev, KVM_CPC_TRACK_RANGE_START, &arg);
- if (ret) err(1, "ioctl TRACK_RANGE_START");
-
- arg = 0;
- ret = ioctl(kvm_dev, KVM_CPC_TRACK_RANGE_END, &arg);
- if (ret) err(1, "ioctl TRACK_RANGE_END");
- }
-
- ret = ioctl(kvm_dev, KVM_CPC_ACK_EVENT, &event.id);
- if (ret) err(1, "ioctl ACK_EVENT");
-
- faultcnt++;
-
- return 0;
- } else if (event.type != CPC_EVENT_TRACK) {
+ if (ret) {
+ if (errno == EAGAIN)
return 0;
+ perror("ioctl POLL_EVENT");
+ return 1;
+ }
+
+ if (event.type == CPC_EVENT_CPUID) {
+ printf("CPUID EVENT\n");
+ if (event.guest.type == CPC_GUEST_START_TRACK) {
+ ret = ioctl(kvm_dev, KVM_CPC_TRACK_EXEC_CUR, &inst_fault_gfn);
+ if (ret) err(1, "ioctl TRACK_EXEC_CUR");
+
+ printf("CPUID INST PAGE: %lu\n", inst_fault_gfn);
+
+ arg = inst_fault_gfn;
+ ret = ioctl(kvm_dev, KVM_CPC_TRACK_RANGE_START, &arg);
+ if (ret) err(1, "ioctl TRACK_RANGE_START");
+
+ arg = inst_fault_gfn+8;
+ ret = ioctl(kvm_dev, KVM_CPC_TRACK_RANGE_END, &arg);
+ if (ret) err(1, "ioctl TRACK_RANGE_END");
+ } else if (event.guest.type == CPC_GUEST_STOP_TRACK) {
+ arg = 0;
+ ret = ioctl(kvm_dev, KVM_CPC_TRACK_RANGE_START, &arg);
+ if (ret) err(1, "ioctl TRACK_RANGE_START");
+
+ arg = 0;
+ ret = ioctl(kvm_dev, KVM_CPC_TRACK_RANGE_END, &arg);
+ if (ret) err(1, "ioctl TRACK_RANGE_END");
}
- printf("EVENT\n");
+ faultcnt++;
+ } else if (event.type == CPC_EVENT_TRACK_STEP) {
+ printf("STEP EVENT\n");
ret = ioctl(kvm_dev, KVM_CPC_READ_COUNTS, counts);
if (ret) err(1, "ioctl READ_COUNTS");
inst_fault_gfn = 0;
read_fault_gfn = 0;
- for (i = 0; i < event.track.fault_count; i++) {
- if ((event.track.fault_errs[i] & 0b11111) == 0b10100)
- inst_fault_gfn = event.track.fault_gfns[i];
- else if ((event.track.fault_errs[i] & 0b00110) == 0b00100)
- read_fault_gfn = event.track.fault_gfns[i];
+ for (i = 0; i < event.step.fault_count; i++) {
+ if ((event.step.fault_errs[i] & 0b11111) == 0b10100)
+ inst_fault_gfn = event.step.fault_gfns[i];
+ else if ((event.step.fault_errs[i] & 0b00110) == 0b00100)
+ read_fault_gfn = event.step.fault_gfns[i];
}
if (!baseline) {
printf("Event: cnt:%llu inst:%lu data:%lu retired:%llu\n",
- event.track.fault_count, inst_fault_gfn,
- read_fault_gfn, event.track.retinst);
+ event.step.fault_count, inst_fault_gfn,
+ read_fault_gfn, event.step.retinst);
print_counts(counts);
printf("\n");
}
@@ -206,15 +204,18 @@ monitor(bool baseline)
}
}
- ret = ioctl(kvm_dev, KVM_CPC_ACK_EVENT, &event.id);
- if (ret) err(1, "ioctl ACK_EVENT");
-
if (baseline) faultcnt++;
- } else if (errno != EAGAIN) {
- perror("ioctl POLL_EVENT");
- return 1;
+ } else if (event.type == CPC_EVENT_TRACK_PAGE) {
+ printf("PAGE EVENT\n");
+
+ printf("Event: prev:%llu new:%llu retired:%llu\n",
+ event.page.inst_gfn_prev, event.page.inst_gfn,
+ event.page.retinst);
}
+ ret = ioctl(kvm_dev, KVM_CPC_ACK_EVENT, &event.id);
+ if (ret) err(1, "ioctl ACK_EVENT");
+
return 0;
}
@@ -283,36 +284,36 @@ main(int argc, const char **argv)
pin_process(0, SECONDARY_CORE, true);
printf("PINNED\n");
- arg = false;
- ret = ioctl(kvm_dev, KVM_CPC_SUB_BASELINE, &arg);
- if (ret) err(1, "ioctl SUB_BASELINE");
+ // arg = false;
+ // ret = ioctl(kvm_dev, KVM_CPC_SUB_BASELINE, &arg);
+ // if (ret) err(1, "ioctl SUB_BASELINE");
- arg = true;
- ret = ioctl(kvm_dev, KVM_CPC_MEASURE_BASELINE, &arg);
- if (ret) err(1, "ioctl MEASURE_BASELINE");
+ // arg = true;
+ // ret = ioctl(kvm_dev, KVM_CPC_MEASURE_BASELINE, &arg);
+ // if (ret) err(1, "ioctl MEASURE_BASELINE");
- arg = KVM_PAGE_TRACK_ACCESS;
- ret = ioctl(kvm_dev, KVM_CPC_TRACK_ALL, &arg);
- if (ret) err(1, "ioctl TRACK_ALL");
+ // arg = KVM_PAGE_TRACK_ACCESS;
+ // ret = ioctl(kvm_dev, KVM_CPC_TRACK_ALL, &arg);
+ // if (ret) err(1, "ioctl TRACK_ALL");
- arg = CPC_TRACK_DATA_ACCESS;
- ret = ioctl(kvm_dev, KVM_CPC_TRACK_MODE, &arg);
- if (ret) err(1, "ioctl TRACK_MODE");
+ // arg = CPC_TRACK_DATA_ACCESS;
+ // ret = ioctl(kvm_dev, KVM_CPC_TRACK_MODE, &arg);
+ // if (ret) err(1, "ioctl TRACK_MODE");
- faultcnt = 0;
- while (faultcnt < 100) {
- if (monitor(true)) break;
- }
+ // faultcnt = 0;
+ // while (faultcnt < 100) {
+ // if (monitor(true)) break;
+ // }
- do {
- ret = ioctl(kvm_dev, KVM_CPC_POLL_EVENT, &event);
- if (ret && errno != EAGAIN)
- err(1, "ioctl POLL_EVENT");
- } while (ret && errno == EAGAIN);
+ // do {
+ // ret = ioctl(kvm_dev, KVM_CPC_POLL_EVENT, &event);
+ // if (ret && errno != EAGAIN)
+ // err(1, "ioctl POLL_EVENT");
+ // } while (ret && errno == EAGAIN);
- arg = KVM_PAGE_TRACK_ACCESS;
- ret = ioctl(kvm_dev, KVM_CPC_UNTRACK_ALL, &arg);
- if (ret) err(1, "ioctl UNTRACK_ALL");
+ // arg = KVM_PAGE_TRACK_ACCESS;
+ // ret = ioctl(kvm_dev, KVM_CPC_UNTRACK_ALL, &arg);
+ // if (ret) err(1, "ioctl UNTRACK_ALL");
arg = CPC_TRACK_EXEC;
ret = ioctl(kvm_dev, KVM_CPC_TRACK_MODE, &arg);
@@ -322,31 +323,31 @@ main(int argc, const char **argv)
ret = ioctl(kvm_dev, KVM_CPC_TRACK_ALL, &arg);
if (ret) err(1, "ioctl TRACK_ALL");
- arg = false;
- ret = ioctl(kvm_dev, KVM_CPC_MEASURE_BASELINE, &arg);
- if (ret) err(1, "ioctl MEASURE_BASELINE");
+ // arg = false;
+ // ret = ioctl(kvm_dev, KVM_CPC_MEASURE_BASELINE, &arg);
+ // if (ret) err(1, "ioctl MEASURE_BASELINE");
- ret = ioctl(kvm_dev, KVM_CPC_READ_BASELINE, baseline);
- if (ret) err(1, "ioctl READ_BASELINE");
+ // ret = ioctl(kvm_dev, KVM_CPC_READ_BASELINE, baseline);
+ // if (ret) err(1, "ioctl READ_BASELINE");
- printf("\n>>> BASELINE:\n");
- print_counts(baseline);
- printf("\n");
- print_counts_raw(baseline);
- printf("\n");
+ // printf("\n>>> BASELINE:\n");
+ // print_counts(baseline);
+ // printf("\n");
+ // print_counts_raw(baseline);
+ // printf("\n");
- /* Check baseline for saturated sets */
- for (i = 0; i < 64; i++) {
- if (baseline[i] >= 8)
- errx(1, "!!! Baseline set %i full\n", i);
- }
+ // /* Check baseline for saturated sets */
+ // for (i = 0; i < 64; i++) {
+ // if (baseline[i] >= 8)
+ // errx(1, "!!! Baseline set %i full\n", i);
+ // }
- arg = true;
- ret = ioctl(kvm_dev, KVM_CPC_SUB_BASELINE, &arg);
- if (ret) err(1, "ioctl SUB_BASELINE");
+ // arg = true;
+ // ret = ioctl(kvm_dev, KVM_CPC_SUB_BASELINE, &arg);
+ // if (ret) err(1, "ioctl SUB_BASELINE");
- ret = ioctl(kvm_dev, KVM_CPC_ACK_EVENT, &event.id);
- if (ret) err(1, "ioctl ACK_EVENT");
+ // ret = ioctl(kvm_dev, KVM_CPC_ACK_EVENT, &event.id);
+ // if (ret) err(1, "ioctl ACK_EVENT");
faultcnt = 0;
while (faultcnt < 10) {
diff --git a/test/aes-detect_guest.c b/test/aes-detect_guest.c
index 3da4044..1b21ebd 100644
--- a/test/aes-detect_guest.c
+++ b/test/aes-detect_guest.c
@@ -39,11 +39,11 @@ main(int argc, const char **argv)
memset(buf, 0, L1_LINESIZE * L1_SETS);
while (1) {
- CPC_DO_VMMCALL(CPC_CPUID_START_TRACK, 0);
+ CPC_DO_VMMCALL(CPC_GUEST_START_TRACK, 0);
buf[L1_LINESIZE * 5] += 1;
- CPC_DO_VMMCALL(CPC_CPUID_START_TRACK, 0);
+ CPC_DO_VMMCALL(CPC_GUEST_START_TRACK, 0);
}
return 0;
diff --git a/test/aes-detect_host.c b/test/aes-detect_host.c
index ccb01fe..0e6dff6 100644
--- a/test/aes-detect_host.c
+++ b/test/aes-detect_host.c
@@ -446,7 +446,7 @@ monitor(void)
ret = ioctl(kvm_dev, KVM_CPC_POLL_EVENT, &event);
if (!ret) {
printf("Got page fault! %llu retired insts\n",
- event.track.retinst);
+ event.step.retinst);
faultcnt++;
printf("Acking event %llu\n", event.id);
diff --git a/test/execstep.c b/test/execstep.c
new file mode 100644
index 0000000..14f8d42
--- /dev/null
+++ b/test/execstep.c
@@ -0,0 +1,632 @@
+#define _GNU_SOURCE
+
+#include "cachepc/uapi.h"
+
+#include <linux/psp-sev.h>
+#include <linux/kvm.h>
+#include <sys/syscall.h>
+#include <sys/ioctl.h>
+#include <sys/user.h>
+#include <sys/wait.h>
+#include <sys/ioctl.h>
+#include <sys/mman.h>
+#include <sys/stat.h>
+#include <sys/types.h>
+#include <unistd.h>
+#include <signal.h>
+#include <dirent.h>
+#include <assert.h>
+#include <errno.h>
+#include <err.h>
+#include <fcntl.h>
+#include <sched.h>
+#include <string.h>
+#include <stdbool.h>
+#include <stdlib.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdarg.h>
+
+#define ARRLEN(x) (sizeof(x) / sizeof((x)[0]))
+#define MIN(a,b) ((a) > (b) ? (b) : (a))
+
+#define TARGET_CORE 2
+#define SECONDARY_CORE 3
+
+#define TARGET_SET 15
+
+struct kvm {
+ int vmfd, vcpufd;
+ void *mem;
+ size_t memsize;
+ struct kvm_run *run;
+};
+
+/* start and end for guest assembly */
+extern uint8_t __start_guest_with[];
+extern uint8_t __stop_guest_with[];
+
+/* ioctl dev fds */
+static int kvm_dev, sev_dev, kvm_dev;
+static int faultcnt;
+
+enum {
+ GSTATE_INIT,
+ GSTATE_LAUNCH,
+ GSTATE_RUNNING,
+};
+
+const char *sev_fwerr_strs[] = {
+ [0x00] = "Success",
+ [0x01] = "Platform state is invalid",
+ [0x02] = "Guest state is invalid",
+ [0x03] = "Platform configuration is invalid",
+ [0x04] = "Buffer too small",
+ [0x05] = "Platform is already owned",
+ [0x06] = "Certificate is invalid",
+ [0x07] = "Request not allowed by policy",
+ [0x08] = "Guest is inactive",
+ [0x09] = "Invalid address",
+ [0x0A] = "Bad signature",
+ [0x0B] = "Bad measurement",
+ [0x0C] = "Asid is already owned",
+ [0x0D] = "Invalid ASID",
+ [0x0E] = "WBINVD is required",
+ [0x0F] = "DF_FLUSH is required",
+ [0x10] = "Guest handle is invalid",
+ [0x11] = "Invalid command",
+ [0x12] = "Guest is active",
+ [0x13] = "Hardware error",
+ [0x14] = "Hardware unsafe",
+ [0x15] = "Feature not supported",
+ [0x16] = "Invalid parameter",
+ [0x17] = "Out of resources",
+ [0x18] = "Integrity checks failed",
+ [0x19] = "RMP page size is incorrect",
+ [0x1A] = "RMP page state is incorrect",
+};
+
+const char *sev_gstate_strs[] = {
+ "INIT",
+ "LAUNCH",
+ "RUNNING",
+};
+
+void
+hexdump(void *data, int len)
+{
+ int i;
+
+ for (i = 0; i < len; i++) {
+ if (i % 16 == 0 && i)
+ printf("\n");
+ printf("%02X ", *(uint8_t *)(data + i));
+ }
+ printf("\n");
+}
+
+__attribute__((section("guest_with"))) void
+vm_guest_with(void)
+{
+ asm volatile ("mov %rbp, %rsp; pop %rbp; \
+ movq $4096, %rcx; movq $0, %rdx; cmp %rcx, %rdx; \
+ cmovne %rdx, %rcx; jmp *%rcx");
+}
+
+bool
+pin_process(pid_t pid, int cpu, bool assert)
+{
+ cpu_set_t cpuset;
+ int ret;
+
+ CPU_ZERO(&cpuset);
+ CPU_SET(cpu, &cpuset);
+ ret = sched_setaffinity(pid, sizeof(cpu_set_t), &cpuset);
+ if (ret < 0) {
+ if (assert) err(1, "sched_setaffinity");
+ return false;
+ }
+
+ return true;
+}
+
+int
+read_stat_core(pid_t pid)
+{
+ char path[256];
+ char line[2048];
+ FILE *file;
+ char *p;
+ int i, cpu;
+
+ snprintf(path, sizeof(path), "/proc/%u/stat", pid);
+ file = fopen(path, "r");
+ if (!file) return -1;
+
+ if (!fgets(line, sizeof(line), file))
+ err(1, "read stat");
+
+ p = line;
+ for (i = 0; i < 38 && (p = strchr(p, ' ')); i++)
+ p += 1;
+
+ if (!p) errx(1, "stat format");
+ cpu = atoi(p);
+
+ fclose(file);
+
+ return cpu;
+}
+
+const char *
+sev_fwerr_str(int code)
+{
+ if (code < 0 || code >= ARRLEN(sev_fwerr_strs)) {
+ warnx("Unknown firmware error %i", code);
+ return "Unknown error";
+ }
+
+ return sev_fwerr_strs[code];
+}
+
+const char *
+sev_gstate_str(int code)
+{
+ if (code < 0 || code >= ARRLEN(sev_gstate_strs)) {
+ warnx("Unknown guest state %i", code);
+ return "Unknown gstate";
+ }
+
+ return sev_gstate_strs[code];
+}
+
+int
+sev_ioctl(int vmfd, int cmd, void *data, int *error)
+{
+ struct kvm_sev_cmd input;
+ int ret;
+
+ memset(&input, 0, sizeof(input));
+ input.id = cmd;
+ input.sev_fd = sev_dev;
+ input.data = (uintptr_t) data;
+
+ ret = ioctl(vmfd, KVM_MEMORY_ENCRYPT_OP, &input);
+ if (error) *error = input.error;
+
+ return ret;
+}
+
+uint8_t
+snp_guest_state(int vmfd)
+{
+ struct kvm_sev_guest_status status;
+ int ret, fwerr;
+
+ assert(false); /* ioctl not implemented yet */
+
+ ret = sev_ioctl(vmfd, KVM_SEV_GUEST_STATUS, &status, &fwerr);
+ if (ret < 0) errx(1, "KVM_SEV_GUEST_STATUS: (%s) %s",
+ strerror(errno), sev_fwerr_str(fwerr));
+
+ return status.state;
+}
+
+
+void
+snp_dbg_encrypt(int vmfd, void *dst, void *src, size_t size)
+{
+ struct kvm_sev_dbg enc;
+ int ret, fwerr;
+
+ assert(false); /* ioctl not implemented yet */
+
+ memset(&enc, 0, sizeof(struct kvm_sev_dbg));
+ enc.src_uaddr = (uintptr_t) src;
+ enc.dst_uaddr = (uintptr_t) dst;
+ enc.len = size;
+
+ ret = sev_ioctl(vmfd, KVM_SEV_DBG_ENCRYPT, &enc, &fwerr);
+ if (ret < 0) errx(1, "KVM_SEV_DBG_ENCRYPT: (%s) %s",
+ strerror(errno), sev_fwerr_str(fwerr));
+}
+
+void
+snp_dbg_decrypt(int vmfd, void *dst, void *src, size_t size)
+{
+ struct kvm_sev_dbg enc;
+ int ret, fwerr;
+
+ // assert(false); /* ioctl not implemented yet */
+
+ memset(&enc, 0, sizeof(struct kvm_sev_dbg));
+ enc.src_uaddr = (uintptr_t) src;
+ enc.dst_uaddr = (uintptr_t) dst;
+ enc.len = size;
+
+ ret = sev_ioctl(vmfd, KVM_SEV_DBG_DECRYPT, &enc, &fwerr);
+ if (ret < 0) errx(1, "KVM_SEV_DBG_DECRYPT: (%s) %s",
+ strerror(errno), sev_fwerr_str(fwerr));
+}
+
+uint64_t
+snp_dbg_decrypt_rip(int vmfd)
+{
+ uint8_t vmsa[PAGE_SIZE];
+ uint64_t rip;
+
+ memset(vmsa, 0, PAGE_SIZE);
+ snp_dbg_decrypt(vmfd, vmsa, CPC_VMSA_MAGIC_ADDR, PAGE_SIZE);
+
+ rip = *(uint64_t *)(vmsa + 0x178);
+
+ return rip;
+}
+
+void
+snp_kvm_init(struct kvm *kvm, size_t ramsize, void *code_start, void *code_stop)
+{
+ // REF: https://www.amd.com/system/files/TechDocs/55766_SEV-KM_API_Specification.pdf
+ struct kvm_sev_snp_launch_update update;
+ struct kvm_sev_snp_launch_start start;
+ struct kvm_sev_snp_launch_finish finish;
+ struct kvm_snp_init init;
+ struct kvm_userspace_memory_region region;
+ struct kvm_enc_region enc_region;
+ struct kvm_regs regs;
+ struct kvm_sregs sregs;
+ int ret, fwerr;
+
+ /* Create a kvm instance */
+ kvm->vmfd = ioctl(kvm_dev, KVM_CREATE_VM, 0);
+ if (kvm->vmfd < 0) err(1, "KVM_CREATE_VM");
+
+ /* Allocate guest memory */
+ kvm->memsize = ramsize;
+ kvm->mem = mmap(NULL, kvm->memsize, PROT_READ | PROT_WRITE,
+ MAP_SHARED | MAP_ANONYMOUS, -1, 0);
+ if (!kvm->mem) err(1, "Allocating guest memory");
+ assert(code_stop - code_start <= kvm->memsize);
+
+ /* Fill memory with nops and put jump code a bit from start
+ * such that we access multiple different pages while running */
+ memset(kvm->mem, 0x90, kvm->memsize);
+ memcpy(kvm->mem + L1_SIZE, // - (code_stop - code_start),
+ code_start, code_stop - code_start);
+
+ /* Map it into the vm */
+ memset(&region, 0, sizeof(region));
+ region.slot = 0;
+ region.memory_size = kvm->memsize;
+ region.guest_phys_addr = 0;
+ region.userspace_addr = (uintptr_t) kvm->mem;
+ ret = ioctl(kvm->vmfd, KVM_SET_USER_MEMORY_REGION, &region);
+ if (ret < 0) err(1, "KVM_SET_USER_MEMORY_REGION");
+
+ /* Enable SEV for vm */
+ memset(&init, 0, sizeof(init));
+ ret = sev_ioctl(kvm->vmfd, KVM_SEV_SNP_INIT, &init, &fwerr);
+ if (ret < 0) errx(1, "KVM_SEV_SNP_INIT: (%s) %s",
+ strerror(errno), sev_fwerr_str(fwerr));
+
+ /* Register memory region */
+ memset(&enc_region, 0, sizeof(enc_region));
+ enc_region.addr = (uintptr_t) kvm->mem;
+ enc_region.size = kvm->memsize;
+ ret = ioctl(kvm->vmfd, KVM_MEMORY_ENCRYPT_REG_REGION, &enc_region);
+ if (ret < 0) err(1, "KVM_MEMORY_ENCRYPT_REG_REGION");
+
+ /* Create virtual cpu */
+ kvm->vcpufd = ioctl(kvm->vmfd, KVM_CREATE_VCPU, 0);
+ if (kvm->vcpufd < 0) err(1, "KVM_CREATE_VCPU");
+
+ /* Map the shared kvm_run structure and following data */
+ ret = ioctl(kvm_dev, KVM_GET_VCPU_MMAP_SIZE, NULL);
+ if (ret < 0) err(1, "KVM_GET_VCPU_MMAP_SIZE");
+ if (ret < sizeof(struct kvm_run))
+ errx(1, "KVM_GET_VCPU_MMAP_SIZE too small");
+ kvm->run = mmap(NULL, ret, PROT_READ | PROT_WRITE,
+ MAP_SHARED, kvm->vcpufd, 0);
+ if (!kvm->run) err(1, "mmap vcpu");
+
+ /* Initialize segment regs */
+ memset(&sregs, 0, sizeof(sregs));
+ ret = ioctl(kvm->vcpufd, KVM_GET_SREGS, &sregs);
+ if (ret < 0) err(1, "KVM_GET_SREGS");
+ sregs.cs.base = 0;
+ sregs.cs.selector = 0;
+ ret = ioctl(kvm->vcpufd, KVM_SET_SREGS, &sregs);
+ if (ret < 0) err(1, "KVM_SET_SREGS");
+
+ /* Initialize rest of registers */
+ memset(&regs, 0, sizeof(regs));
+ regs.rip = 0;
+ regs.rsp = kvm->memsize - L1_SETS * L1_LINESIZE - 8;
+ regs.rbp = kvm->memsize - L1_SETS * L1_LINESIZE - 8;
+ ret = ioctl(kvm->vcpufd, KVM_SET_REGS, &regs);
+ if (ret < 0) err(1, "KVM_SET_REGS");
+
+ /* Generate encryption keys and set policy */
+ memset(&start, 0, sizeof(start));
+ start.policy = 1 << 17; /* must be set */
+ start.policy |= 1 << 19; /* allow debug */
+ start.policy |= 1 << 16; /* allow simultaneous multi-threading */
+ ret = sev_ioctl(kvm->vmfd, KVM_SEV_SNP_LAUNCH_START, &start, &fwerr);
+ if (ret < 0) errx(1, "KVM_SEV_SNP_LAUNCH_START: (%s) %s",
+ strerror(errno), sev_fwerr_str(fwerr));
+
+ /* Prepare the vm memory */
+ memset(&update, 0, sizeof(update));
+ update.uaddr = (uintptr_t) kvm->mem;
+ update.len = ramsize;
+ update.start_gfn = 0;
+ update.page_type = KVM_SEV_SNP_PAGE_TYPE_NORMAL;
+ ret = sev_ioctl(kvm->vmfd, KVM_SEV_SNP_LAUNCH_UPDATE, &update, &fwerr);
+ if (ret < 0) errx(1, "KVM_SEV_SNP_LAUNCH_UPDATE: (%s) %s",
+ strerror(errno), sev_fwerr_str(fwerr));
+
+ /* Finalize launch process */
+ memset(&finish, 0, sizeof(finish));
+ ret = sev_ioctl(kvm->vmfd, KVM_SEV_SNP_LAUNCH_FINISH, &finish, &fwerr);
+ if (ret < 0) errx(1, "KVM_SEV_SNP_LAUNCH_FINISH: (%s) %s",
+ strerror(errno), sev_fwerr_str(fwerr));
+}
+
+void
+snp_kvm_deinit(struct kvm *kvm)
+{
+ close(kvm->vmfd);
+ close(kvm->vcpufd);
+ munmap(kvm->mem, kvm->memsize);
+}
+
+cpc_msrmt_t *
+read_counts()
+{
+ cpc_msrmt_t *counts;
+ int i, ret;
+
+ counts = malloc(L1_SETS * sizeof(cpc_msrmt_t));
+ if (!counts) err(1, "malloc");
+
+ ret = ioctl(kvm_dev, KVM_CPC_READ_COUNTS, counts);
+ if (ret) err(1, "ioctl READ_COUNTS");
+
+ for (i = 0; i < L1_SETS; i++) {
+ if (counts[i] > 8)
+ errx(1, "Invalid counts set %i", i);
+ }
+
+ return counts;
+}
+
+void
+print_counts(cpc_msrmt_t *counts)
+{
+ int i;
+
+ for (i = 0; i < 64; i++) {
+ if (i % 16 == 0 && i)
+ printf("\n");
+ if (counts[i] == 1)
+ printf("\x1b[38;5;88m");
+ else if (counts[i] > 1)
+ printf("\x1b[38;5;196m");
+ printf("%2i ", i);
+ if (counts[i] > 0)
+ printf("\x1b[0m");
+ }
+ printf("\n");
+}
+
+void
+print_counts_raw(cpc_msrmt_t *counts)
+{
+ int i;
+
+ for (i = 0; i < 64; i++) {
+ if (i % 16 == 0 && i)
+ printf("\n");
+ if (counts[i] == 1)
+ printf("\x1b[38;5;88m");
+ else if (counts[i] > 1)
+ printf("\x1b[38;5;196m");
+ printf("%02X ", (uint8_t) counts[i]);
+ if (counts[i] > 0)
+ printf("\x1b[0m");
+ }
+ printf("\n");
+}
+
+void
+runonce(struct kvm *kvm)
+{
+ int ret;
+
+ ret = ioctl(kvm->vcpufd, KVM_RUN, NULL);
+ if (ret < 0) err(1, "KVM_RUN");
+}
+
+int
+monitor(struct kvm *kvm, bool baseline)
+{
+ struct cpc_event event;
+ cpc_msrmt_t counts[64];
+ int ret, i;
+
+ /* Get page fault info */
+ ret = ioctl(kvm_dev, KVM_CPC_POLL_EVENT, &event);
+ if (ret) {
+ if (errno == EAGAIN)
+ return 0;
+ warn("ioctl POLL_EVENT");
+ return 1;
+ }
+
+ if (event.type == CPC_EVENT_TRACK_STEP) {
+ ret = ioctl(kvm_dev, KVM_CPC_READ_COUNTS, counts);
+ if (ret) err(1, "ioctl READ_COUNTS");
+
+ if (!baseline) {
+ printf("Event: cnt:%llu rip:%lu, inst:%llu data:%llu retired:%llu\n",
+ event.step.fault_count,
+ 0, // snp_dbg_decrypt_rip(kvm->vmfd),
+ event.step.fault_gfns[0],
+ event.step.fault_gfns[1],
+ event.step.retinst);
+ print_counts(counts);
+ printf("\n");
+ }
+
+ for (i = 0; i < 64; i++) {
+ if (counts[i] > 8) {
+ warnx("Invalid count for set %i (%llu)",
+ i, counts[i]);
+ }
+ }
+
+ if (baseline) faultcnt++;
+ } else if (event.type == CPC_EVENT_TRACK_PAGE) {
+ printf("Event: inst page from:%llu to:%llu rip:%lu\n\n",
+ event.page.inst_gfn_prev, event.page.inst_gfn,
+ 0); //snp_dbg_decrypt_rip(kvm->vmfd));
+
+ if (!baseline) faultcnt++;
+ }
+
+ ret = ioctl(kvm_dev, KVM_CPC_ACK_EVENT, &event.id);
+ if (ret) err(1, "ioctl ACK_EVENT");
+
+ return 0;
+}
+
+int
+main(int argc, const char **argv)
+{
+ struct kvm kvm_with_access;
+ uint64_t track_mode;
+ pid_t ppid, pid;
+ uint32_t arg;
+ struct cpc_event event;
+ cpc_msrmt_t baseline[64];
+ int ret, i;
+
+ setvbuf(stdout, NULL, _IONBF, 0);
+
+ pin_process(0, TARGET_CORE, true);
+
+ sev_dev = open("/dev/sev", O_RDWR | O_CLOEXEC);
+ if (sev_dev < 0) err(1, "open /dev/sev");
+
+ kvm_dev = open("/dev/kvm", O_RDWR | O_CLOEXEC);
+ if (kvm_dev < 0) err(1, "open /dev/kvm");
+
+ /* Make sure we have the stable version of the API */
+ ret = ioctl(kvm_dev, KVM_GET_API_VERSION, NULL);
+ if (ret < 0) err(1, "KVM_GET_API_VERSION");
+ if (ret != 12) errx(1, "KVM_GET_API_VERSION %d, expected 12", ret);
+
+ /* Setup needed performance counters */
+ ret = ioctl(kvm_dev, KVM_CPC_SETUP_PMC, NULL);
+ if (ret < 0) err(1, "ioctl SETUP_PMC");
+
+ snp_kvm_init(&kvm_with_access, L1_SIZE * 2,
+ __start_guest_with, __stop_guest_with);
+
+ /* Page tracking init needs to happen after kvm
+ * init so main_kvm is set.. */
+
+ /* Reset previous tracking */
+ ret = ioctl(kvm_dev, KVM_CPC_RESET_TRACKING, NULL);
+ if (ret) err(1, "ioctl RESET_TRACKING");
+
+ /* Do data access stepping */
+ arg = CPC_TRACK_STUB;
+ ret = ioctl(kvm_dev, KVM_CPC_TRACK_MODE, &arg);
+ if (ret) err(1, "ioctl TRACK_MODE");
+
+ /* Init page tracking */
+ track_mode = KVM_PAGE_TRACK_EXEC;
+ ret = ioctl(kvm_dev, KVM_CPC_TRACK_ALL, &track_mode);
+ if (ret) err(1, "ioctl TRACK_ALL");
+
+ arg = true;
+ ret = ioctl(kvm_dev, KVM_CPC_MEASURE_BASELINE, &arg);
+ if (ret) err(1, "ioctl MEASURE_BASELINE");
+
+ ppid = getpid();
+ if ((pid = fork())) {
+ if (pid < 0) err(1, "fork");
+
+ sleep(1); /* give time for child to pin other core */
+
+ printf("VMRUN\n");
+ runonce(&kvm_with_access);
+ printf("VMRUN DONE\n");
+ } else {
+ pin_process(0, SECONDARY_CORE, true);
+ printf("PINNED\n");
+
+ faultcnt = 0;
+ while (faultcnt < 300) {
+ if (monitor(&kvm_with_access, true)) break;
+ }
+
+ do {
+ ret = ioctl(kvm_dev, KVM_CPC_POLL_EVENT, &event);
+ if (ret && errno != EAGAIN)
+ err(1, "ioctl POLL_EVENT");
+ } while (ret && errno == EAGAIN);
+
+ arg = false;
+ ret = ioctl(kvm_dev, KVM_CPC_MEASURE_BASELINE, &arg);
+ if (ret) err(1, "ioctl MEASURE_BASELINE");
+
+ ret = ioctl(kvm_dev, KVM_CPC_READ_BASELINE, baseline);
+ if (ret) err(1, "ioctl READ_BASELINE");
+
+ printf("\n>>> BASELINE:\n");
+ print_counts(baseline);
+ printf("\n");
+ print_counts_raw(baseline);
+ printf("\n");
+
+ /* Check baseline for saturated sets */
+ for (i = 0; i < 64; i++) {
+ if (baseline[i] >= 8)
+ warnx("!!! Baseline set %i full\n", i);
+ }
+
+ arg = true;
+ ret = ioctl(kvm_dev, KVM_CPC_SUB_BASELINE, &arg);
+ if (ret) err(1, "ioctl SUB_BASELINE");
+
+ ret = ioctl(kvm_dev, KVM_CPC_RESET_TRACKING, NULL);
+ if (ret) err(1, "ioctl RESET_TRACKING");
+
+ arg = CPC_TRACK_EXEC;
+ ret = ioctl(kvm_dev, KVM_CPC_TRACK_MODE, &arg);
+ if (ret) err(1, "ioctl TRACK_MODE");
+
+ track_mode = KVM_PAGE_TRACK_EXEC;
+ ret = ioctl(kvm_dev, KVM_CPC_TRACK_ALL, &track_mode);
+ if (ret) err(1, "ioctl TRACK_ALL");
+
+ ret = ioctl(kvm_dev, KVM_CPC_ACK_EVENT, &event.id);
+ if (ret) err(1, "ioctl ACK_EVENT");
+
+ faultcnt = 0;
+ while (faultcnt < 20) {
+ if (monitor(&kvm_with_access, false)) break;
+ }
+
+ kill(ppid, SIGTERM);
+ exit(0);
+ }
+
+ snp_kvm_deinit(&kvm_with_access);
+
+ close(kvm_dev);
+ close(sev_dev);
+}
+
diff --git a/test/sevstep.c b/test/fullstep.c
index a8dd3aa..e7abee9 100644
--- a/test/sevstep.c
+++ b/test/fullstep.c
@@ -449,20 +449,24 @@ monitor(struct kvm *kvm, bool baseline)
/* Get page fault info */
ret = ioctl(kvm_dev, KVM_CPC_POLL_EVENT, &event);
- if (!ret) {
- if (event.type != CPC_EVENT_TRACK)
+ if (ret) {
+ if (errno == EAGAIN)
return 0;
+ perror("ioctl POLL_EVENT");
+ return 1;
+ }
+ if (event.type == CPC_EVENT_TRACK_STEP) {
ret = ioctl(kvm_dev, KVM_CPC_READ_COUNTS, counts);
if (ret == -1) err(1, "ioctl READ_COUNTS");
rip = 0; // snp_dbg_rip(kvm->vmfd);
if (!baseline) {
printf("Event: cnt:%llu inst:%llu data:%llu retired:%llu rip:%lu\n",
- event.track.fault_count,
- event.track.fault_gfns[0],
- event.track.fault_gfns[1],
- event.track.retinst, rip);
+ event.step.fault_count,
+ event.step.fault_gfns[0],
+ event.step.fault_gfns[1],
+ event.step.retinst, rip);
print_counts(counts);
printf("\n");
}
@@ -474,14 +478,11 @@ monitor(struct kvm *kvm, bool baseline)
i, counts[i]);
}
}
-
- ret = ioctl(kvm_dev, KVM_CPC_ACK_EVENT, &event.id);
- if (ret == -1) err(1, "ioctl ACK_EVENT");
- } else if (errno != EAGAIN) {
- perror("ioctl POLL_EVENT");
- return 1;
}
+ ret = ioctl(kvm_dev, KVM_CPC_ACK_EVENT, &event.id);
+ if (ret == -1) err(1, "ioctl ACK_EVENT");
+
return 0;
}
@@ -526,7 +527,7 @@ main(int argc, const char **argv)
if (ret == -1) err(1, "ioctl RESET_TRACKING");
/* Do data access stepping */
- arg = CPC_TRACK_DATA_ACCESS;
+ arg = CPC_TRACK_FULL;
ret = ioctl(kvm_dev, KVM_CPC_TRACK_MODE, &arg);
if (ret == -1) err(1, "ioctl TRACK_MODE");
diff --git a/test/fulltrack b/test/fulltrack
new file mode 100755
index 0000000..5344b51
--- /dev/null
+++ b/test/fulltrack
Binary files differ
diff --git a/test/libkcapi b/test/libkcapi
-Subproject c2af62dcc7a287f3c14f6aaec5724401c1ea470
+Subproject c27b154f03ad7e94447c7114d73aee60f009809