-
Notifications
You must be signed in to change notification settings - Fork 98
ETRACKC
SGX INSTRUCTION REFERENCES ETRACKC — Activates EBLOCK Checks
Opcode/ Instruction | Op/En | 64/32 bit Mode Support | CPUID Feature Flag | Description |
EAX = 11H ENCLS[ETRACKC] | IR | V/V | EAX[6] | This leaf function activates EBLOCK checks. |
Op/En | EAX | RCX | ||
IR | ETRACK (In) | Return error code (Out) | Address of the destination EPC page (In, EA) | Address of the SECS page (In, EA) |
The ETRACKC instruction is thread safe variant of ETRACK leaf and can be executed concurrently with other CPU threads operating on the same SECS.
This leaf function provides the mechanism for hardware to track that software has completed the required TLB address clears successfully. The instruction can only be executed when the current privilege level is 0.
The content of RCX is an effective address of an EPC page.
The table below provides additional information on the memory parameter of ETRACK leaf function.
ETRACKC Memory Parameter Semantics
EPCPAGE |
Read/Write access permitted by Enclave |
The error codes are:
Table 40-48. ETRACKC Return Value in RAX
Error Code | Value | Description |
No Error | 0 | ETRACKC successful. |
SGX_EPC_PAGE_CONFLICT | 7 | Failure due to concurrent operation of another SGX instruction. |
SGX_PG_INVLD | 6 | Target page is not a VALID EPC page. |
SGX_PREV_TRK_INCMPL | 17 | All processors did not complete the previous tracking sequence. |
SGX_TRACK_NOT_REQUIRED | 27 | Target page type does not require tracking. |
Concurrency Restrictions
Table 40-49. Base Concurrency Restrictions of ETRACKC
Leaf | Parameter | Base Concurrency Restrictions | ||
Access | On Conflict | SGX_CONFLICT VM Exit Qualification | ||
ETRACKC | Target [DS:RCX] | Shared | SGX_EPC_PAGE_ CONFLICT | |
SECS implicit | Concurrent |
Vol. 3D 40-75 SGX INSTRUCTION REFERENCES
Table 40-50. Additional Concurrency Restrictions of ETRACKC
Leaf | Parameter | Additional Concurrency Restrictions | |||||
vs. EACCEPT, EACCEPTCOPY, EMODPE, EMODPR, EMODT | vs. EADD, EEXTEND, EINIT | vs. ETRACK, ETRACKC | |||||
Access | On Conflict | Access | On Conflict | Access | On Conflict | ||
ETRACKC | Target [DS:RCX] | Concurrent | Concurrent | Concurrent | |||
SECS implicit | Concurrent | Concurrent | Exclusive | SGX_EPC_PAGE _CONFLICT |
<table>
<tr>
<td><b>Name</b></td>
<td><b>Type</b></td>
<td><b>Size (Bits)</b></td>
<td><b>Description</b></td>
</tr>
<tr>
<td>TMP_SECS</td>
<td>Physical Address</td>
<td>64</td>
<td>Physical address of the SECS of the page being modified.</td>
</tr>
</table>
(* check alignment of EPCPAGE (RCX) *)
IF (DS:RCX is not 4KByte Aligned) THEN
#GP(0); FI;
(* check that EPCPAGE (DS:RCX) is the address of an EPC page *)
IF (DS:RCX does not resolve within an EPC) THEN
#PF(DS:RCX, PFEC.SGX); FI;
(* Check the EPC page for concurrency *)
IF (EPC page is being modified) THEN
RFLAGS.ZF ← 1;
RFLAGS.CF ← 0;
RAX ← SGX_EPC_PAGE_CONFLICT;
goto DONE_POST_LOCK_RELEASE;
FI;
(* check to make sure the page is valid *)
IF (EPCM(DS:RCX).VALID = 0) THEN
RFLAGS.ZF ← 1;
RFLAGS.CF ← 0;
RAX ← SGX_PG_INVLD;
GOTO DONE;
FI;
(* find out the target SECS page *)
IF (EPCM(DS:RCX).PT is PT_REG or PT_TCS or PT_TRIM) THEN
TMP_SECS ← Obtain SECS through EPCM(DS:RCX).ENCLAVESECS;
ELSE IF (EPCM(DS:RCX).PT is PT_SECS) THEN
TMP_SECS ← Obtain SECS through (DS:RCX);
ELSE
RFLAGS.ZF ← 0;
RFLAGS.CF ← 1;
RAX ← SGX_TRACK_NOT_REQUIRED;
GOTO DONE;
FI;
40-76 Vol. 3D
SGX INSTRUCTION REFERENCES
(* Check concurrency with other Intel SGX instructions *)
IF (Other Intel SGX instructions using tracking facility on this SECS) THEN
IF ((VMX non-root mode) and
(ENABLE_EPC_VIRTUALIZATION_EXTENSIONS Execution Control = 1)) THEN
VMCS.Exit_reason ← SGX_CONFLICT;
VMCS.Exit_qualification.code ← TRACKING_RESOURCE_CONFLICT;
VMCS.Exit_qualification.error ← 0;
VMCS.Guest-physical_address ←
SECS(TMP_SECS).ENCLAVECONTEXT;
VMCS.Guest-linear_address ← 0;
Deliver VMEXIT;
FI;
RFLAGS.ZF ← 1;
RFLAGS.CF ← 0;
RAX ← SGX_EPC_PAGE_CONFLICT;
GOTO DONE;
FI;
(* All processors must have completed the previous tracking cycle*)
IF ( (TMP_SECS).TRACKING ≠ 0) )
THEN
IF ((VMX non-root mode) and
(ENABLE_EPC_VIRTUALIZATION_EXTENSIONS Execution Control = 1)) THEN
VMCS.Exit_reason ← SGX_CONFLICT;
VMCS.Exit_qualification.code ← TRACKING_REFERENCE_CONFLICT;
VMCS.Exit_qualification.error ← 0;
VMCS.Guest-physical_address ←
SECS(TMP_SECS).ENCLAVECONTEXT;
VMCS.Guest-linear_address ← 0;
Deliver VMEXIT;
FI;
RFLAGS.ZF ← 1;
RFLAGS.CF ← 0;
RAX ← SGX_PREV_TRK_INCMPL;
GOTO DONE;
FI;
RFLAGS.ZF ← 0;
RFLAGS.CF ← 0;
RAX ← 0;
DONE:
(* clear flags *)
RFLAGS.PF,AF,OF,SF ← 0;
ZF is set if ETRACKC fails due to concurrent operations with another SGX instructions or target page is an invalid EPC page or tracking is not completed on SECS page; otherwise cleared.
CF is set if target page is not of a type that requires tracking; otherwise cleared.
PF, AF, OF and SF are cleared.
Vol. 3D 40-77 SGX INSTRUCTION REFERENCES
#GP(0) If the memory operand violates access-control policies of DS segment. If DS segment is unusable. If the memory operand is not properly aligned.
#PF(error code) If the memory operand expected to be in EPC does not resolve to an EPC page. If a page fault occurs in access memory operand.
#GP(0) If a memory address is in a non-canonical form. If a memory operand is not properly aligned.
#PF(error code) If the memory operand expected to be in EPC does not resolve to an EPC page. If a page fault occurs in access memory operand.
40-78 Vol. 3D
Source: Intel® Architecture Software Developer's Manual (May 2018)
Generated: 5-6-2018