On 25/10/2018 16:39, Andrew Cooper wrote:
> This is very dangerous from a security point of view, because a missing entry
> will cause L2's action to be interpreted as L1's action.
> 
> Signed-off-by: Andrew Cooper <[email protected]>
> ---
> CC: Sergey Dyasli <[email protected]>
> CC: Jan Beulich <[email protected]>
> CC: Wei Liu <[email protected]>
> CC: Jun Nakajima <[email protected]>
> CC: Kevin Tian <[email protected]>
> ---
>  xen/arch/x86/hvm/vmx/vvmx.c | 3 ++-
>  1 file changed, 2 insertions(+), 1 deletion(-)
> 
> diff --git a/xen/arch/x86/hvm/vmx/vvmx.c b/xen/arch/x86/hvm/vmx/vvmx.c
> index d1c8a41..817d85f 100644
> --- a/xen/arch/x86/hvm/vmx/vvmx.c
> +++ b/xen/arch/x86/hvm/vmx/vvmx.c
> @@ -2609,8 +2609,9 @@ int nvmx_n2_vmexit_handler(struct cpu_user_regs *regs,
>              nvcpu->nv_vmexit_pending = 1;
>          break;
>      default:
> -        gprintk(XENLOG_ERR, "Unexpected nested vmexit: reason %u\n",
> +        gprintk(XENLOG_ERR, "Unhandled nested vmexit: reason %u\n",
>                  exit_reason);
> +        domain_crash(v->domain);
>      }
>  
>      return ( nvcpu->nv_vmexit_pending == 1 );

Can you consider adding handling for the following?

        EXIT_REASON_INVD
        EXIT_REASON_RDTSCP
        EXIT_REASON_VMFUNC

But in any case:

Reviewed-by: Sergey Dyasli <[email protected]>

--
Thanks,
Sergey

_______________________________________________
Xen-devel mailing list
[email protected]
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to