linux/tools/testing
Joao Martins 23200b7a30 KVM: x86/xen: intercept xen hypercalls if enabled
Add a new exit reason for emulator to handle Xen hypercalls.

Since this means KVM owns the ABI, dispense with the facility for the
VMM to provide its own copy of the hypercall pages; just fill them in
directly using VMCALL/VMMCALL as we do for the Hyper-V hypercall page.

This behaviour is enabled by a new INTERCEPT_HCALL flag in the
KVM_XEN_HVM_CONFIG ioctl structure, and advertised by the same flag
being returned from the KVM_CAP_XEN_HVM check.

Rename xen_hvm_config() to kvm_xen_write_hypercall_page() and move it
to the nascent xen.c while we're at it, and add a test case.

Signed-off-by: Joao Martins <joao.m.martins@oracle.com>
Signed-off-by: David Woodhouse <dwmw@amazon.co.uk>
2021-02-04 14:18:45 +00:00
..
fault-injection
ktest Kbuild updates for v5.11 2020-12-22 14:02:39 -08:00
kunit kunit: tool: Force the use of the 'tty' console for UML 2021-01-04 09:18:38 -07:00
nvdimm x86, libnvdimm/test: Remove COPY_MC_TEST 2020-10-26 18:08:35 +01:00
radix-tree ida: Free allocated bitmap in error path 2020-10-07 09:11:33 -04:00
scatterlist RDMA 5.11 pull request 2020-12-16 13:42:26 -08:00
selftests KVM: x86/xen: intercept xen hypercalls if enabled 2021-02-04 14:18:45 +00:00
vsock SPDX patches for 5.7-rc1. 2020-04-03 13:12:26 -07:00