Re: [Patch v4 00/13] Add Hyper-v extended hypercall support in KVM
From: Vipin Sharma
Date: Tue Jan 03 2023 - 19:34:33 EST
On Mon, Dec 12, 2022 at 10:37 AM Vipin Sharma <vipinsh@xxxxxxxxxx> wrote:
>
> Hi,
>
> There are two patch series combined in this one because I have rebased
> my patch series (patches 8 to 13) on top of Vitaly's "Hyper-V invariant TSC control
> feature" (patches 1 to 7).
> https://lore.kernel.org/kvm/87o7szouyr.fsf@xxxxxxxxxxxxxxxxxxxxxxxxxxx/
>
> Vitaly's series had some small merge conflicts on the KVM queue branch I
> have fixed them in this series, no code changes.
>
> My patches (8 to 13) add Hyper-V extended hypercall support and selftests.
>
> v4:
> - Changed vm_vaddr_t to vm_paddr_t in hyperv_extended_hypercalls.
> - Changed ASSERT_EXIT_REASON to TEST_ASSERT_KVM_EXIT_REASON
>
> v3: https://lore.kernel.org/lkml/20221205191430.2455108-1-vipinsh@xxxxxxxxxx/
> - Rebased on top of Vitaly's "Hyper-V invariant TSC control feature"
> series.
> - Removed enabling KVM_CAP_HYPERV_ENFORCE_CPUID in
> hyperv_extended_hypercalls test.
>
>
> v2: https://lore.kernel.org/lkml/20221121234026.3037083-1-vipinsh@xxxxxxxxxx/
> - Intorduced ASSERT_EXIT_REASON macro and replaced all occurences of
> TEST_ASSERT for vcpu exit reason.
> - Skip hyperv_extended_hypercalls test if extended hypercalls are not
> supported by the kernel.
> - Rebased with latest KVM queue.
> - Addressed all of the comments in patch 6 of v1.
>
> v1: https://lore.kernel.org/lkml/20221105045704.2315186-1-vipinsh@xxxxxxxxxx/
>
> RFC: https://lore.kernel.org/lkml/20221021185916.1494314-1-vipinsh@xxxxxxxxxx/
>
> Vipin Sharma (6):
> KVM: x86: hyper-v: Use common code for hypercall userspace exit
> KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
> KVM: selftests: Test Hyper-V extended hypercall enablement
> KVM: selftests: Replace hardcoded Linux OS id with HYPERV_LINUX_OS_ID
> KVM: selftests: Make vCPU exit reason test assertion common.
> KVM: selftests: Test Hyper-V extended hypercall exit to userspace
>
> Vitaly Kuznetsov (7):
> x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define
> KVM: x86: Add a KVM-only leaf for CPUID_8000_0007_EDX
> KVM: x86: Hyper-V invariant TSC control
> KVM: selftests: Rename 'msr->available' to 'msr->fault_exepected' in
> hyperv_features test
> KVM: selftests: Convert hyperv_features test to using
> KVM_X86_CPU_FEATURE()
> KVM: selftests: Test that values written to Hyper-V MSRs are preserved
> KVM: selftests: Test Hyper-V invariant TSC control
>
> arch/x86/include/asm/hyperv-tlfs.h | 3 +
> arch/x86/include/asm/kvm_host.h | 1 +
> arch/x86/kernel/cpu/mshyperv.c | 2 +-
> arch/x86/kvm/cpuid.c | 11 +-
> arch/x86/kvm/hyperv.c | 74 +++-
> arch/x86/kvm/hyperv.h | 27 ++
> arch/x86/kvm/reverse_cpuid.h | 7 +
> arch/x86/kvm/x86.c | 4 +-
> tools/testing/selftests/kvm/.gitignore | 1 +
> tools/testing/selftests/kvm/Makefile | 1 +
> .../testing/selftests/kvm/aarch64/psci_test.c | 4 +-
> .../testing/selftests/kvm/include/test_util.h | 10 +
> .../selftests/kvm/include/x86_64/hyperv.h | 149 +++++---
> .../selftests/kvm/include/x86_64/processor.h | 1 +
> .../kvm/lib/s390x/diag318_test_handler.c | 3 +-
> .../selftests/kvm/s390x/sync_regs_test.c | 15 +-
> .../selftests/kvm/set_memory_region_test.c | 6 +-
> tools/testing/selftests/kvm/x86_64/amx_test.c | 8 +-
> .../kvm/x86_64/cr4_cpuid_sync_test.c | 8 +-
> .../testing/selftests/kvm/x86_64/debug_regs.c | 2 +-
> .../selftests/kvm/x86_64/flds_emulation.h | 5 +-
> .../selftests/kvm/x86_64/hyperv_clock.c | 9 +-
> .../selftests/kvm/x86_64/hyperv_evmcs.c | 8 +-
> .../kvm/x86_64/hyperv_extended_hypercalls.c | 93 +++++
> .../selftests/kvm/x86_64/hyperv_features.c | 353 +++++++++++-------
> .../testing/selftests/kvm/x86_64/hyperv_ipi.c | 6 +-
> .../selftests/kvm/x86_64/hyperv_svm_test.c | 7 +-
> .../selftests/kvm/x86_64/hyperv_tlb_flush.c | 14 +-
> .../selftests/kvm/x86_64/kvm_clock_test.c | 5 +-
> .../selftests/kvm/x86_64/kvm_pv_test.c | 5 +-
> .../selftests/kvm/x86_64/monitor_mwait_test.c | 9 +-
> .../kvm/x86_64/nested_exceptions_test.c | 5 +-
> .../selftests/kvm/x86_64/platform_info_test.c | 14 +-
> .../kvm/x86_64/pmu_event_filter_test.c | 6 +-
> tools/testing/selftests/kvm/x86_64/smm_test.c | 9 +-
> .../testing/selftests/kvm/x86_64/state_test.c | 8 +-
> .../selftests/kvm/x86_64/svm_int_ctl_test.c | 8 +-
> .../kvm/x86_64/svm_nested_shutdown_test.c | 7 +-
> .../kvm/x86_64/svm_nested_soft_inject_test.c | 6 +-
> .../selftests/kvm/x86_64/svm_vmcall_test.c | 6 +-
> .../selftests/kvm/x86_64/sync_regs_test.c | 25 +-
> .../kvm/x86_64/triple_fault_event_test.c | 9 +-
> .../selftests/kvm/x86_64/tsc_scaling_sync.c | 6 +-
> .../kvm/x86_64/ucna_injection_test.c | 22 +-
> .../selftests/kvm/x86_64/userspace_io_test.c | 6 +-
> .../kvm/x86_64/userspace_msr_exit_test.c | 22 +-
> .../kvm/x86_64/vmx_apic_access_test.c | 11 +-
> .../kvm/x86_64/vmx_close_while_nested_test.c | 5 +-
> .../selftests/kvm/x86_64/vmx_dirty_log_test.c | 7 +-
> .../vmx_exception_with_invalid_guest_state.c | 4 +-
> .../x86_64/vmx_invalid_nested_guest_state.c | 4 +-
> .../kvm/x86_64/vmx_nested_tsc_scaling_test.c | 6 +-
> .../kvm/x86_64/vmx_preemption_timer_test.c | 8 +-
> .../kvm/x86_64/vmx_tsc_adjust_test.c | 6 +-
> .../selftests/kvm/x86_64/xapic_ipi_test.c | 6 +-
> .../selftests/kvm/x86_64/xen_shinfo_test.c | 7 +-
> .../selftests/kvm/x86_64/xen_vmcall_test.c | 5 +-
> 57 files changed, 586 insertions(+), 493 deletions(-)
> create mode 100644 tools/testing/selftests/kvm/x86_64/hyperv_extended_hypercalls.c
>
> --
> 2.39.0.rc1.256.g54fd8350bd-goog
>
Hi Paolo, Sean
Is this one on your todo for 6.3?
Thanks
Vipin