openvmm icon indicating copy to clipboard operation
openvmm copied to clipboard

[TDX] Process Shared page EPT_VIOLATION exits in vmx handler as part of Guest VSM support

Open ckotamra opened this issue 11 months ago • 2 comments

EPT violation of shared pages are received by L1 when the host VMM can’t handle them hence they are routed to L1 where intercept messages are checked and forwarded to VTL1 (Secure Kernel) to handle them, if enabled.

Part of VSM support in OpenVMM, such intercepts need to be routed via OpenVMM as intercept messages to min_secure_vtl i.e. VTL1 (i.e. Hyperguard support).

ckotamra avatar Jan 17 '25 07:01 ckotamra

In our handler for VmxExit::EPT_VIOLATION we need to call vpinner.post_message when appropriate

Do we need this for SNP's NPF exit type too?

smalis-msft avatar Mar 13 '25 17:03 smalis-msft

John: we might need some tweaks, because I think for the intercept use case we probably need to avoid queuing

i.e. maybe we do want to just put the thing into the sint directly, I don't know

smalis-msft avatar Mar 13 '25 17:03 smalis-msft

Also see #1543

sluck-msft avatar Jun 19 '25 18:06 sluck-msft