[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v2 12/17] xen: vmx: handle ENCLS VMEXIT
From: Kai Huang <kai.huang@xxxxxxxxxxxxxxx> Currently EPC are statically allocated and mapped to guest, we don't have to trap ENCLS as it runs perfectly in VMX non-root mode. But exposing SGX to guest means we also expose ENABLE_ENCLS bit to L1 hypervisor, therefore we cannot stop L1 from enabling ENCLS VMEXIT. For ENCLS VMEXIT from L2 guest, we simply inject it to L1, otherwise the ENCLS VMEXIT is unexpected in L0 and we simply crash the domain. Signed-off-by: Kai Huang <kai.huang@xxxxxxxxxxxxxxx> --- xen/arch/x86/hvm/vmx/vmx.c | 10 ++++++++++ xen/arch/x86/hvm/vmx/vvmx.c | 11 +++++++++++ xen/include/asm-x86/hvm/vmx/vmcs.h | 1 + xen/include/asm-x86/hvm/vmx/vmx.h | 1 + 4 files changed, 23 insertions(+) diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c index ce1c95f69062..c48c44565fc5 100644 --- a/xen/arch/x86/hvm/vmx/vmx.c +++ b/xen/arch/x86/hvm/vmx/vmx.c @@ -4118,6 +4118,16 @@ void vmx_vmexit_handler(struct cpu_user_regs *regs) vmx_handle_apic_write(); break; + case EXIT_REASON_ENCLS: + /* + * Currently L0 doesn't turn on ENCLS VMEXIT, but L0 cannot stop L1 + * from enabling ENCLS VMEXIT. ENCLS VMEXIT from L2 guest has already + * been handled so by reaching here it is a BUG. We simply crash the + * domain. + */ + domain_crash(v->domain); + break; + case EXIT_REASON_PML_FULL: vmx_vcpu_flush_pml_buffer(v); break; diff --git a/xen/arch/x86/hvm/vmx/vvmx.c b/xen/arch/x86/hvm/vmx/vvmx.c index dde02c076b9f..9c6123dc35ee 100644 --- a/xen/arch/x86/hvm/vmx/vvmx.c +++ b/xen/arch/x86/hvm/vmx/vvmx.c @@ -2094,6 +2094,12 @@ int nvmx_msr_read_intercept(unsigned int msr, u64 *msr_content) SECONDARY_EXEC_ENABLE_VPID | SECONDARY_EXEC_UNRESTRICTED_GUEST | SECONDARY_EXEC_ENABLE_EPT; + /* + * If SGX is exposed to guest, then ENABLE_ENCLS bit must also be + * exposed to guest. + */ + if ( d->arch.cpuid->feat.sgx ) + data |= SECONDARY_EXEC_ENABLE_ENCLS; data = gen_vmx_msr(data, 0, host_data); break; case MSR_IA32_VMX_EXIT_CTLS: @@ -2316,6 +2322,11 @@ int nvmx_n2_vmexit_handler(struct cpu_user_regs *regs, case EXIT_REASON_VMXON: case EXIT_REASON_INVEPT: case EXIT_REASON_XSETBV: + /* + * L0 doesn't turn on ENCLS VMEXIT now, so ENCLS VMEXIT must come from + * L2 guest, and is because of ENCLS VMEXIT is turned on by L1. + */ + case EXIT_REASON_ENCLS: /* inject to L1 */ nvcpu->nv_vmexit_pending = 1; break; diff --git a/xen/include/asm-x86/hvm/vmx/vmcs.h b/xen/include/asm-x86/hvm/vmx/vmcs.h index 44ff4f0a113f..f68f3d0f6801 100644 --- a/xen/include/asm-x86/hvm/vmx/vmcs.h +++ b/xen/include/asm-x86/hvm/vmx/vmcs.h @@ -407,6 +407,7 @@ enum vmcs_field { VIRT_EXCEPTION_INFO = 0x0000202a, XSS_EXIT_BITMAP = 0x0000202c, TSC_MULTIPLIER = 0x00002032, + ENCLS_EXITING_BITMAP = 0x0000202E, GUEST_PHYSICAL_ADDRESS = 0x00002400, VMCS_LINK_POINTER = 0x00002800, GUEST_IA32_DEBUGCTL = 0x00002802, diff --git a/xen/include/asm-x86/hvm/vmx/vmx.h b/xen/include/asm-x86/hvm/vmx/vmx.h index 7341cb191ef2..8547de9168eb 100644 --- a/xen/include/asm-x86/hvm/vmx/vmx.h +++ b/xen/include/asm-x86/hvm/vmx/vmx.h @@ -215,6 +215,7 @@ static inline void pi_clear_sn(struct pi_desc *pi_desc) #define EXIT_REASON_APIC_WRITE 56 #define EXIT_REASON_INVPCID 58 #define EXIT_REASON_VMFUNC 59 +#define EXIT_REASON_ENCLS 60 #define EXIT_REASON_PML_FULL 62 #define EXIT_REASON_XSAVES 63 #define EXIT_REASON_XRSTORS 64 -- 2.15.0 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |