Re: [PATCHv5 07/30] x86/traps: Add #VE support for TDX guest

From: Dave Hansen
Date: Tue Mar 08 2022 - 15:30:18 EST


On 3/2/22 06:27, Kirill A. Shutemov wrote:
> Virtualization Exceptions (#VE) are delivered to TDX guests due to
> specific guest actions which may happen in either user space or the
> kernel:
>
> * Specific instructions (WBINVD, for example)
> * Specific MSR accesses
> * Specific CPUID leaf accesses
> * Access to specific guest physical addresses
...
> arch/x86/coco/tdx.c | 31 +++++++++++++
> arch/x86/include/asm/idtentry.h | 4 ++
> arch/x86/include/asm/tdx.h | 21 +++++++++
> arch/x86/kernel/idt.c | 3 ++
> arch/x86/kernel/traps.c | 81 +++++++++++++++++++++++++++++++++

I know it took a long time to get here, but it's really, really nice
that this ended up being all done in C without any nastiness in the
kernel to deal with things like NMIs.

Reviewed-by: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>