summaryrefslogtreecommitdiff
path: root/include/uapi
diff options
context:
space:
mode:
authorSean Christopherson <seanjc@google.com>2025-11-21 14:20:18 -0800
committerSean Christopherson <seanjc@google.com>2026-01-08 10:51:46 -0800
commitff8071eb3aa54e96336ecce7c88b25f9a4d62383 (patch)
treef8bedb7b54eff052578dd0e14d00f883f1ef7a75 /include/uapi
parent9ace4753a5202b02191d54e9fdf7f9e3d02b85eb (diff)
KVM: VMX: Always reflect SGX EPCM #PFs back into the guest
When handling intercepted #PFs, reflect EPCM (Enclave Page Cache Map) violations, i.e. #PFs with the SGX flag set, back into the guest. KVM doesn't shadow EPCM entries (the EPCM deals only with virtual/linear addresses), and so EPCM violation cannot be due to KVM interference, and more importantly can't be resolved by KVM. On pre-SGX2 hardware, EPCM violations are delivered as #GP(0) faults, but on SGX2+ hardware, they are delivered as #PF(SGX). Failure to account for the SGX2 behavior could put a vCPU into an infinite loop due to KVM not realizing the #PF is the guest's responsibility. Take care to deliver the EPCM violation as a #GP(0) if the _guest_ CPU model is only SGX1. Fixes: 72add915fbd5 ("KVM: VMX: Enable SGX virtualization for SGX1, SGX2 and LC") Cc: Kai Huang <kai.huang@intel.com> Reviewed-by: Richard Lyu <richard.lyu@suse.com> Reviewed-by: Kai Huang <kai.huang@intel.com> Link: https://patch.msgid.link/20251121222018.348987-1-seanjc@google.com Signed-off-by: Sean Christopherson <seanjc@google.com>
Diffstat (limited to 'include/uapi')
0 files changed, 0 insertions, 0 deletions