-
Notifications
You must be signed in to change notification settings - Fork 132
CVM: Set GuestCrashRegsAvailable in cpuid #1308
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Do we need to maybe filter offering this diagnostic on if cvm tracing is enabled?
versus before:
|
I think also, we may want to print the crash message within UH itself? |
We don't need to filter this on cvm tracing, it is the responsibility of the guest to not send secret data to these. However the crash message is a different story, since I believe it's just a pointer into guest memory, so that we would have to be careful about reading and sharing. |
I guess if we emit the guest message as a normal tracing call, then we'll follow whatever the normal filtering logic is. I think though, we should emit the message because OHCL is may be the only thing that can actually read it, the host can't. |
I don't think that's true. |
I don't think we need to filter the mere availability of the crash registers, and our forwarding of them to the host, on whether CVM debugging is enabled or not. They contain extremely minimal information (5 u64s if no message, 3 if there is a message), and this is already the policy of the legacy HCL. I do think we need to filter the message itself, if one is included, however that can come in a follow up PR (I agree that tracing the message would be valuable)(#1395). Today the host is unable to read the message anyways, as the memory pointed to by P3 will be encrypted in a CVM. |
We support these regs on all backends, so no reason not to.
Backported in #1403 |
We support these regs on all backends, so no reason not to.