On Mon, Nov 4, 2024 at 5:13 PM Paolo Bonzini wrote:
>
> On Wed, Oct 30, 2024 at 4:35 AM Zack Rusin wrote:
> >
> > VMware products handle hypercalls in userspace. Give KVM the ability
> > to run VMware guests unmodified by fowarding all hypercalls to the
> > user
Gleixner
Cc: Ingo Molnar
Cc: Borislav Petkov
Cc: Dave Hansen
Cc: x...@kernel.org
Cc: "H. Peter Anvin"
Cc: Shuah Khan
Cc: Namhyung Kim
Cc: Arnaldo Carvalho de Melo
Cc: Isaku Yamahata
Cc: Joel Stanley
Cc: Zack Rusin
Cc: k...@vger.kernel.org
Cc: linux-doc@vger.kernel.org
Cc: linux
of KVM to support VMware specific hypercalls.
Signed-off-by: Zack Rusin
Cc: Doug Covelli
Cc: Paolo Bonzini
Cc: Jonathan Corbet
Cc: Sean Christopherson
Cc: Thomas Gleixner
Cc: Ingo Molnar
Cc: Borislav Petkov
Cc: Dave Hansen
Cc: x...@kernel.org
Cc: "H. Peter Anvin"
Cc: Shuah Khan
hypervisor level and allows setting it on a per-vm basis.
The default is whatever kvm.enable_vmware_backdoor was set to, which
by default is false.
Signed-off-by: Zack Rusin
Cc: Doug Covelli
Cc: Paolo Bonzini
Cc: Jonathan Corbet
Cc: Sean Christopherson
Cc: Thomas Gleixner
Cc: Ingo Molnar
Cc
Add a testcase to exercise KVM_CAP_X86_VMWARE_HYPERCALL and validate
that KVM exits to userspace on hypercalls and registers are correctly
preserved.
Signed-off-by: Zack Rusin
Cc: Doug Covelli
Cc: Paolo Bonzini
Cc: Jonathan Corbet
Cc: Sean Christopherson
Cc: Thomas Gleixner
Cc: Ingo Molnar
On Thu, Nov 7, 2024 at 5:32 PM Sean Christopherson wrote:
>
> On Mon, Nov 04, 2024, Zack Rusin wrote:
> > On Mon, Nov 4, 2024 at 5:13 PM Paolo Bonzini wrote:
> > >
> > > On Wed, Oct 30, 2024 at 4:35 AM Zack Rusin
> > > wrote:
> > > >
> >