diff options
author | Joao Martins <joao.m.martins@oracle.com> | 2018-06-13 09:55:44 -0400 |
---|---|---|
committer | David Woodhouse <dwmw@amazon.co.uk> | 2021-02-04 14:18:45 +0000 |
commit | 23200b7a30de315d0e9a40663c905869d29d833c (patch) | |
tree | 4b2959be8858c55698a11fb9e32a77cb397632bc /tools/hv/lsvmbus | |
parent | 92f4d400a407235783afd4399fa26c4c665024b5 (diff) | |
download | linux-23200b7a30de315d0e9a40663c905869d29d833c.tar.bz2 |
KVM: x86/xen: intercept xen hypercalls if enabled
Add a new exit reason for emulator to handle Xen hypercalls.
Since this means KVM owns the ABI, dispense with the facility for the
VMM to provide its own copy of the hypercall pages; just fill them in
directly using VMCALL/VMMCALL as we do for the Hyper-V hypercall page.
This behaviour is enabled by a new INTERCEPT_HCALL flag in the
KVM_XEN_HVM_CONFIG ioctl structure, and advertised by the same flag
being returned from the KVM_CAP_XEN_HVM check.
Rename xen_hvm_config() to kvm_xen_write_hypercall_page() and move it
to the nascent xen.c while we're at it, and add a test case.
Signed-off-by: Joao Martins <joao.m.martins@oracle.com>
Signed-off-by: David Woodhouse <dwmw@amazon.co.uk>
Diffstat (limited to 'tools/hv/lsvmbus')
0 files changed, 0 insertions, 0 deletions