Re: [PATCH v8 06/11] x86/traps: Add #VE support for TDX guest
From: Andi Kleen
Date: Mon Oct 11 2021 - 12:49:28 EST
Minor clarification: it eliminates the chance of a #VE during the syscall gap
_if the VMM is benign_. If the VMM is malicious, it can unmap and remap the
syscall page to induce an EPT Violation #VE due to the page not being accepted.
This has been addressed. The TDX module will support a mode that forbids
unmapping pages permanently, and Linux is going to check/enforce that
this mode is enabled. The patch for the check is not included in the
posted patches yet though.
This question?
Can the hypervisor cause an already-accepted secure-EPT page to transition to
the unaccepted state?
Yep. I wrote the above before following the link, I should have guessed which
question it was :-)
IIRC, the proposed middle ground was to add a TDCALL and/or TDPARAMS setting that
would allow the guest to opt-out of EPT Violation #VE due to page not accepted,
It's a TDPARAMS setting
-Andi