Re: [RFC PATCH v6 31/32] x86/sev: Prevent SECURE_AVIC_CONTROL MSR interception for Secure AVIC guests
From: Tianyu Lan
Date: Mon Jun 09 2025 - 03:41:10 EST
On Wed, May 14, 2025 at 3:33 PM Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx> wrote:
>
> The SECURE_AVIC_CONTROL MSR holds the GPA of the guest APIC backing
> page and bitfields to control enablement of Secure AVIC and NMI by
> guest vCPUs. This MSR is populated by the guest and the hypervisor
> should not intercept it. A #VC exception will be generated otherwise.
> If this occurs and Secure AVIC is enabled, terminate guest execution.
>
> Signed-off-by: Neeraj Upadhyay <Neeraj.Upadhyay@xxxxxxx>
> ---
Reviewed-by: Tianyu Lan <tiala@xxxxxxxxxxxxx>
--
Thanks
Tianyu Lan