mirror of
https://github.com/projectacrn/acrn-hypervisor.git
synced 2025-09-22 09:17:58 +00:00
xsave: inject GP when guest tries to write 1 to XCR0 reserved bit
According to SDM vol1 13.3: Write 1 to reserved bit of XCR0 will trigger GP. This patch make ACRN behavior align with SDM definition. Tracked-On: #3239 Signed-off-by: Yin Fengwei <fengwei.yin@intel.com> Acked-by: Eddie Dong <eddie.dong@intel.com>
This commit is contained in:
@@ -283,6 +283,14 @@ int32_t cpuid_vmexit_handler(struct acrn_vcpu *vcpu)
|
||||
/*
|
||||
* XSETBV instruction set's the XCR0 that is used to tell for which
|
||||
* components states can be saved on a context switch using xsave.
|
||||
*
|
||||
* According to SDM vol3 25.1.1:
|
||||
* Invalid-opcode exception (UD) and faults based on privilege level (include
|
||||
* virtual-8086 mode previleged instructions are not recognized) have higher
|
||||
* priority than VM exit.
|
||||
*
|
||||
* We don't need to handle those case here because we depends on VMX to handle
|
||||
* them.
|
||||
*/
|
||||
static int32_t xsetbv_vmexit_handler(struct acrn_vcpu *vcpu)
|
||||
{
|
||||
@@ -308,6 +316,8 @@ static int32_t xsetbv_vmexit_handler(struct acrn_vcpu *vcpu)
|
||||
/* bit 0(x87 state) of XCR0 can't be cleared */
|
||||
if ((val64 & 0x01UL) == 0UL) {
|
||||
vcpu_inject_gp(vcpu, 0U);
|
||||
} else if ((val64 & XCR0_RESERVED_BITS) != 0UL) {
|
||||
vcpu_inject_gp(vcpu, 0U);
|
||||
} else {
|
||||
/*
|
||||
* XCR0[2:1] (SSE state & AVX state) can't not be
|
||||
|
Reference in New Issue
Block a user