KVM: selftests: Use host's native hypercall instruction in kvm_hypercall() On Wed, Dec 28, 2022, Vishal Annapurve wrote: > Invoke vmcall/vmmcall instructions from kvm_hypercall as per host CPU () for functions, i.e. kvm_hypercall(). > type. s/type/vendor, "type" is too generic. > CVMs and current kvm_hyerpcall callers need to execute hypercall CVM isn't a not ubiquitous acronym. I would avoid it entirely because "CVM" doesn't strictly imply memory encryption, e.g. KVM could still patch the guest in a pKVM-like implementation. Use the host CPU's native hypercall instruction, i.e. VMCALL vs. VMMCALL, in kvm_hypercall(), as relying on KVM to patch in the native hypercall on a #UD for the "wrong" hypercall requires KVM_X86_QUIRK_FIX_HYPERCALL_INSN to be enabled and flat out doesn't work if guest memory is encrypted with a private key, e.g. for SEV VMs.