Message ID | 20221105045704.2315186-4-vipinsh@google.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp808743wru; Fri, 4 Nov 2022 21:59:09 -0700 (PDT) X-Google-Smtp-Source: AMsMyM7v3IKadMmcM6SrnXHGJCJiStF7+VfrVuwGAWCegteV2yLoJESJfIzSzTjSzTdbz8ZT9dEV X-Received: by 2002:a63:c04b:0:b0:46f:c183:242d with SMTP id z11-20020a63c04b000000b0046fc183242dmr25405039pgi.287.1667624348874; Fri, 04 Nov 2022 21:59:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667624348; cv=none; d=google.com; s=arc-20160816; b=Ynns+IA6xgiGFuBpvolEvWJ1EYIhswDEx39HKe8tUxBJgN1rRAHP7g7G54RsKXTRqR FXPrW/jS/ndN82rvQqQARO+B3b5FWCyVf05tdFyvztm1Rpc0RFAxEJJOGcmV8MjNU8vd dm8tLkx7szOqVYMo/j6n+gTFIsRaH3HDbp4aIaceYWicf2LupZ3e1AWHzFATt+Glh66K V+XydB5I3dHS5pHgGlVquIEvDbDp5PIW9xB7BaEtwT1V1J83zWx+oAu5CZiXBjI8EY7h a5zL3dFELxgR7tn52ggUCs6/2Bayx83r/2z+FFOHYK2XfQZQsYpDzemqoFBzZPjOafC4 xV2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:dkim-signature; bh=n6Upwu++k4u4pvTQ5ggpu28fN9WErU6ZbFJtDquZjUo=; b=DY8fvxFJB5LKG99FzoWe31RMPGFd7xXyEhFL+2va0CrzUcn5O03VYJfvX1mWyWajQa K4UnqnEmrpwvjWE+r6fboI0FqGsrR+IVBUoNW0EhXQWB5mDitt8DhoIIb0FC0tr47SOT UukgggfpZg98KrmFTPrZrysaQWcCbzHnbJKD7xRBobK54Vx7uZTFmD5T8TTDpmG/hrla G2Yvhe+pJ7Tf2QwlQGYmB4Sg9/W8HlJkmn/8XOSoUCDfhueh9714I559C9j+H0uYrqGH BijcNlJMWNITkab7s1uyTvZlBf5UMd8/eSC+Ci4+Y7qnFaOuTC++3JwX7NNaUYFJK0xQ Y+4A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=gwunFD8X; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q12-20020a63cc4c000000b0046abab88fd9si1908496pgi.677.2022.11.04.21.58.56; Fri, 04 Nov 2022 21:59:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=gwunFD8X; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229645AbiKEE5W (ORCPT <rfc822;hjfbswb@gmail.com> + 99 others); Sat, 5 Nov 2022 00:57:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47084 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229603AbiKEE5P (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Sat, 5 Nov 2022 00:57:15 -0400 Received: from mail-pg1-x549.google.com (mail-pg1-x549.google.com [IPv6:2607:f8b0:4864:20::549]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2090E31F9D for <linux-kernel@vger.kernel.org>; Fri, 4 Nov 2022 21:57:15 -0700 (PDT) Received: by mail-pg1-x549.google.com with SMTP id g66-20020a636b45000000b0043a256d3639so3442308pgc.12 for <linux-kernel@vger.kernel.org>; Fri, 04 Nov 2022 21:57:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=n6Upwu++k4u4pvTQ5ggpu28fN9WErU6ZbFJtDquZjUo=; b=gwunFD8XRkB8tadYDha1qv/kRbDMr1XGQO+PmaHs5uPp80MzHt+AYtQBb1FEzg2RAR irHZokc2miBdZR7YaSYRWxBK9nEUsVNpZAOBvsupFTUytJOg0+ds2NYQoQyerq34hC+Y p1PkX1fGoXWBXXMPOx0mOyo/iwgTfnPgZzICMEnTkZu0mWKshtik31He5oszFlNyrz43 e7QeYPXeLdVF52hlBSFEjC/RJ3015l9aQEm4B7lVy9hj/5RtnywsGszEMFAL6k32tKvw jceiWseFi+j95U9168l+lnNladYXUm0KgO269XNo2V/8aVxzeNpZrKZFTqCmuY9a3kQ9 e2eQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=n6Upwu++k4u4pvTQ5ggpu28fN9WErU6ZbFJtDquZjUo=; b=FBg/pknOhYhIdmfjEnJVvHXFd72lJl4uvDqEJXfgBcVxcjHSS0FCD7N+Pn0gTcw8eX ZX6h8iX72oGUcK5zDipBosDNUUeDEMc+xdmaC9fjgnFHiT0NQbaqPu9EJ5Vqm7cQ1sY9 unHsZvKqyzWmjfGssEuLV1vxOfkSuzbNOLinLE38iJCGKri1NEfj5IVI8XyJkZpIfSOD sHW9jSL4yAEFzEB9k9ulnhn7g/JFeASJ+T/Fof3ewhMJJ7f5lPxHCvmUljXY87UPgtT/ Hy39z7PSp8ARkWTNFiweMsD08NKHUrDxL6TFGVfDepcGzKy8uFgX9sOnxzfTXWPlN5lJ yB2Q== X-Gm-Message-State: ACrzQf2f2rW9tUnP7ZxhltpOKBubcHSFwTCEZKd4IxokGFRT1ywF5DL/ hvBG+ke0Yx2sIrFkaeNUsvrN5+Q3QOZc X-Received: from vipin.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:479f]) (user=vipinsh job=sendgmr) by 2002:a05:6a00:2409:b0:54e:a3ad:d32d with SMTP id z9-20020a056a00240900b0054ea3add32dmr38883061pfh.70.1667624234662; Fri, 04 Nov 2022 21:57:14 -0700 (PDT) Date: Fri, 4 Nov 2022 21:57:01 -0700 In-Reply-To: <20221105045704.2315186-1-vipinsh@google.com> Mime-Version: 1.0 References: <20221105045704.2315186-1-vipinsh@google.com> X-Mailer: git-send-email 2.38.1.273.g43a17bfeac-goog Message-ID: <20221105045704.2315186-4-vipinsh@google.com> Subject: [PATCH 3/6] KVM: selftests: Test Hyper-V extended hypercall enablement From: Vipin Sharma <vipinsh@google.com> To: seanjc@google.com, pbonzini@redhat.com, vkuznets@redhat.com Cc: dmatlack@google.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Vipin Sharma <vipinsh@google.com> Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1748630869295286554?= X-GMAIL-MSGID: =?utf-8?q?1748630869295286554?= |
Series |
Add Hyper-v extended hypercall support in KVM
|
|
Commit Message
Vipin Sharma
Nov. 5, 2022, 4:57 a.m. UTC
Test Extended hypercall CPUID enablement
Signed-off-by: Vipin Sharma <vipinsh@google.com>
---
tools/testing/selftests/kvm/include/x86_64/hyperv.h | 4 ++++
tools/testing/selftests/kvm/x86_64/hyperv_features.c | 9 +++++++++
2 files changed, 13 insertions(+)
Comments
On Fri, Nov 04, 2022 at 09:57:01PM -0700, Vipin Sharma wrote: > Test Extended hypercall CPUID enablement nit: Use complete sentences and provide more details on what exactly is being tested. The rest of the commit messages look pretty good so I assume you just forgot to fill this one in fully before sending to the mailing list :) > > Signed-off-by: Vipin Sharma <vipinsh@google.com> > --- > tools/testing/selftests/kvm/include/x86_64/hyperv.h | 4 ++++ > tools/testing/selftests/kvm/x86_64/hyperv_features.c | 9 +++++++++ > 2 files changed, 13 insertions(+) > > diff --git a/tools/testing/selftests/kvm/include/x86_64/hyperv.h b/tools/testing/selftests/kvm/include/x86_64/hyperv.h > index b66910702c0a..075fd29071a6 100644 > --- a/tools/testing/selftests/kvm/include/x86_64/hyperv.h > +++ b/tools/testing/selftests/kvm/include/x86_64/hyperv.h > @@ -110,6 +110,7 @@ > #define HV_ACCESS_STATS BIT(8) > #define HV_DEBUGGING BIT(11) > #define HV_CPU_MANAGEMENT BIT(12) > +#define HV_ENABLE_EXTENDED_HYPERCALLS BIT(20) > #define HV_ISOLATION BIT(22) > > /* HYPERV_CPUID_FEATURES.EDX */ > @@ -164,6 +165,9 @@ > #define HVCALL_FLUSH_GUEST_PHYSICAL_ADDRESS_SPACE 0x00af > #define HVCALL_FLUSH_GUEST_PHYSICAL_ADDRESS_LIST 0x00b0 > > +/* Extended hypercalls */ > +#define HV_EXT_CALL_QUERY_CAPABILITIES 0x8001 > + > #define HV_FLUSH_ALL_PROCESSORS BIT(0) > #define HV_FLUSH_ALL_VIRTUAL_ADDRESS_SPACES BIT(1) > #define HV_FLUSH_NON_GLOBAL_MAPPINGS_ONLY BIT(2) > diff --git a/tools/testing/selftests/kvm/x86_64/hyperv_features.c b/tools/testing/selftests/kvm/x86_64/hyperv_features.c > index 05b32e550a80..6b443ce456b6 100644 > --- a/tools/testing/selftests/kvm/x86_64/hyperv_features.c > +++ b/tools/testing/selftests/kvm/x86_64/hyperv_features.c > @@ -602,6 +602,15 @@ static void guest_test_hcalls_access(void) > hcall->expect = HV_STATUS_SUCCESS; > break; > case 19: > + hcall->control = HV_EXT_CALL_QUERY_CAPABILITIES; > + hcall->expect = HV_STATUS_ACCESS_DENIED; > + break; > + case 20: > + feat->ebx |= HV_ENABLE_EXTENDED_HYPERCALLS; > + hcall->control = HV_EXT_CALL_QUERY_CAPABILITIES | HV_HYPERCALL_FAST_BIT; > + hcall->expect = HV_STATUS_INVALID_PARAMETER; > + break; > + case 21: > kvm_vm_free(vm); > return; > } > -- > 2.38.1.273.g43a17bfeac-goog >
On Mon, Nov 7, 2022 at 10:27 AM David Matlack <dmatlack@google.com> wrote: > > On Fri, Nov 04, 2022 at 09:57:01PM -0700, Vipin Sharma wrote: > > Test Extended hypercall CPUID enablement > > nit: Use complete sentences and provide more details on what exactly > is being tested. > > The rest of the commit messages look pretty good so I assume you just > forgot to fill this one in fully before sending to the mailing list :) > Missed it, I will update it. > > > > Signed-off-by: Vipin Sharma <vipinsh@google.com> > > --- > > tools/testing/selftests/kvm/include/x86_64/hyperv.h | 4 ++++ > > tools/testing/selftests/kvm/x86_64/hyperv_features.c | 9 +++++++++ > > 2 files changed, 13 insertions(+) > > > > diff --git a/tools/testing/selftests/kvm/include/x86_64/hyperv.h b/tools/testing/selftests/kvm/include/x86_64/hyperv.h > > index b66910702c0a..075fd29071a6 100644 > > --- a/tools/testing/selftests/kvm/include/x86_64/hyperv.h > > +++ b/tools/testing/selftests/kvm/include/x86_64/hyperv.h > > @@ -110,6 +110,7 @@ > > #define HV_ACCESS_STATS BIT(8) > > #define HV_DEBUGGING BIT(11) > > #define HV_CPU_MANAGEMENT BIT(12) > > +#define HV_ENABLE_EXTENDED_HYPERCALLS BIT(20) > > #define HV_ISOLATION BIT(22) > > > > /* HYPERV_CPUID_FEATURES.EDX */ > > @@ -164,6 +165,9 @@ > > #define HVCALL_FLUSH_GUEST_PHYSICAL_ADDRESS_SPACE 0x00af > > #define HVCALL_FLUSH_GUEST_PHYSICAL_ADDRESS_LIST 0x00b0 > > > > +/* Extended hypercalls */ > > +#define HV_EXT_CALL_QUERY_CAPABILITIES 0x8001 > > + > > #define HV_FLUSH_ALL_PROCESSORS BIT(0) > > #define HV_FLUSH_ALL_VIRTUAL_ADDRESS_SPACES BIT(1) > > #define HV_FLUSH_NON_GLOBAL_MAPPINGS_ONLY BIT(2) > > diff --git a/tools/testing/selftests/kvm/x86_64/hyperv_features.c b/tools/testing/selftests/kvm/x86_64/hyperv_features.c > > index 05b32e550a80..6b443ce456b6 100644 > > --- a/tools/testing/selftests/kvm/x86_64/hyperv_features.c > > +++ b/tools/testing/selftests/kvm/x86_64/hyperv_features.c > > @@ -602,6 +602,15 @@ static void guest_test_hcalls_access(void) > > hcall->expect = HV_STATUS_SUCCESS; > > break; > > case 19: > > + hcall->control = HV_EXT_CALL_QUERY_CAPABILITIES; > > + hcall->expect = HV_STATUS_ACCESS_DENIED; > > + break; > > + case 20: > > + feat->ebx |= HV_ENABLE_EXTENDED_HYPERCALLS; > > + hcall->control = HV_EXT_CALL_QUERY_CAPABILITIES | HV_HYPERCALL_FAST_BIT; > > + hcall->expect = HV_STATUS_INVALID_PARAMETER; > > + break; > > + case 21: > > kvm_vm_free(vm); > > return; > > } > > -- > > 2.38.1.273.g43a17bfeac-goog > >
diff --git a/tools/testing/selftests/kvm/include/x86_64/hyperv.h b/tools/testing/selftests/kvm/include/x86_64/hyperv.h index b66910702c0a..075fd29071a6 100644 --- a/tools/testing/selftests/kvm/include/x86_64/hyperv.h +++ b/tools/testing/selftests/kvm/include/x86_64/hyperv.h @@ -110,6 +110,7 @@ #define HV_ACCESS_STATS BIT(8) #define HV_DEBUGGING BIT(11) #define HV_CPU_MANAGEMENT BIT(12) +#define HV_ENABLE_EXTENDED_HYPERCALLS BIT(20) #define HV_ISOLATION BIT(22) /* HYPERV_CPUID_FEATURES.EDX */ @@ -164,6 +165,9 @@ #define HVCALL_FLUSH_GUEST_PHYSICAL_ADDRESS_SPACE 0x00af #define HVCALL_FLUSH_GUEST_PHYSICAL_ADDRESS_LIST 0x00b0 +/* Extended hypercalls */ +#define HV_EXT_CALL_QUERY_CAPABILITIES 0x8001 + #define HV_FLUSH_ALL_PROCESSORS BIT(0) #define HV_FLUSH_ALL_VIRTUAL_ADDRESS_SPACES BIT(1) #define HV_FLUSH_NON_GLOBAL_MAPPINGS_ONLY BIT(2) diff --git a/tools/testing/selftests/kvm/x86_64/hyperv_features.c b/tools/testing/selftests/kvm/x86_64/hyperv_features.c index 05b32e550a80..6b443ce456b6 100644 --- a/tools/testing/selftests/kvm/x86_64/hyperv_features.c +++ b/tools/testing/selftests/kvm/x86_64/hyperv_features.c @@ -602,6 +602,15 @@ static void guest_test_hcalls_access(void) hcall->expect = HV_STATUS_SUCCESS; break; case 19: + hcall->control = HV_EXT_CALL_QUERY_CAPABILITIES; + hcall->expect = HV_STATUS_ACCESS_DENIED; + break; + case 20: + feat->ebx |= HV_ENABLE_EXTENDED_HYPERCALLS; + hcall->control = HV_EXT_CALL_QUERY_CAPABILITIES | HV_HYPERCALL_FAST_BIT; + hcall->expect = HV_STATUS_INVALID_PARAMETER; + break; + case 21: kvm_vm_free(vm); return; }