On 11/7/22 09:27, Yu Zhang wrote:
VMFUNC is not supported for L1 guests, and executing VMFUNC in L1 shall generate a #UD directly. Just disable it in secondary proc-based execution control for L1, instead of intercepting it and inject the #UD again. Signed-off-by: Yu Zhang<yu.c.zhang@xxxxxxxxxxxxxxx>
Is this for TDX or similar? The reason for a patch should be mentioned in the commit message.
Paolo