[TDX] Process Shared page EPT_VIOLATION exits in vmx handler as part of Guest VSM support
EPT violation of shared pages are received by L1 when the host VMM can’t handle them hence they are routed to L1 where intercept messages are checked and forwarded to VTL1 (Secure Kernel) to handle them, if enabled.
Part of VSM support in OpenVMM, such intercepts need to be routed via OpenVMM as intercept messages to min_secure_vtl i.e. VTL1 (i.e. Hyperguard support).
In our handler for VmxExit::EPT_VIOLATION we need to call vpinner.post_message when appropriate
Do we need this for SNP's NPF exit type too?
John: we might need some tweaks, because I think for the intercept use case we probably need to avoid queuing
i.e. maybe we do want to just put the thing into the sint directly, I don't know
Also see #1543