Message ID | 20221212183720.4062037-1-vipinsh@google.com |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:f944:0:0:0:0:0 with SMTP id q4csp2402106wrr; Mon, 12 Dec 2022 10:38:01 -0800 (PST) X-Google-Smtp-Source: AA0mqf6DDUA87kZ3N/DXLypwhaGeIM1eWwACcNE5sw4lKc/pjBzDm1e15wNtywXuCAkI4iDDJ045 X-Received: by 2002:a05:6402:370e:b0:463:398a:9fe7 with SMTP id ek14-20020a056402370e00b00463398a9fe7mr13581356edb.34.1670870281702; Mon, 12 Dec 2022 10:38:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670870281; cv=none; d=google.com; s=arc-20160816; b=Sn1zgrRbZLGEkp5S333RRIADZ6Uy6kmjlgmiLR6T4FmIkZL5A5XZJiU/tH18jk8wrr me9qbrR5r+Ek6Tyi8gSO8oozupKXAp6AAwlg5oSZlGWsH10cs7egcs1VlS7mV5Ti/6ns //+g/R2s/ZBsY5Vfkc2AI7K24Rz4wUBUN05y6495hEHyB7KauE+prZEnTc/+hkTza+Hm 24dUws1ENb/WlOdwx+323zpE1kLF/5bxvC5e4qErtGVBSAbDvDQm+1BkeQgohFCBCyHu 0RPbnHG7Nz0dXyQxfCoEcor0obnIa6LQnkR6T2UH4IQoAkoN+3sjSCwObcV0uAzONL2V awQw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:mime-version:date :dkim-signature; bh=cV0LLC+HCNdvxfmizvUcCR3HoP+4upKhCe7XAna94P4=; b=Us/aOK2fEXlQu+KCr/J4LVzRFwSEyatzHS2KgpCTV8+VzdhfHXNLD0VllnhxqRqfbQ 08TprvrhtKluyCuprBtyq6R3TjdlHA1WzKs2sx1DvBUwFn9cLuT8Q6j1ggv28cVIMsqN dndUPYr5gSvhKipfdDz/haVKgVaQi9W25b7T4Ir7Kh9UX6e9L6R4hHj8KGac4k9BeciI 7Fl2HCi5HUuobBqK5JYatp6FQIuzve4lSM2eJIoQxMIhAS+oM78uVjizHjp0aNRRqtxC 4eM9sWRaTGWpLlg02LZJY4pUTR3BQPgktbP9YhWB3jiX2pQh3POzlrtmUFsN8R94csLt +WFA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=PM1U30z9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a2-20020a509b42000000b0046db7269b73si7056815edj.463.2022.12.12.10.37.38; Mon, 12 Dec 2022 10:38:01 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=PM1U30z9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233534AbiLLShe (ORCPT <rfc822;jeantsuru.cumc.mandola@gmail.com> + 99 others); Mon, 12 Dec 2022 13:37:34 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58128 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233582AbiLLShZ (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Mon, 12 Dec 2022 13:37:25 -0500 Received: from mail-pg1-x549.google.com (mail-pg1-x549.google.com [IPv6:2607:f8b0:4864:20::549]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3ECB813CC4 for <linux-kernel@vger.kernel.org>; Mon, 12 Dec 2022 10:37:23 -0800 (PST) Received: by mail-pg1-x549.google.com with SMTP id 38-20020a630b26000000b004773803dda1so8092014pgl.17 for <linux-kernel@vger.kernel.org>; Mon, 12 Dec 2022 10:37:23 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=cV0LLC+HCNdvxfmizvUcCR3HoP+4upKhCe7XAna94P4=; b=PM1U30z95XSwVBUcwkLONjXh8FOmRymYzewstTmmN0m5GpDgEDRD2w6293bsG55xOX M1PYEjk/jZ7Bo8rN6H2j5f7wNqk/zjvPNryzLmYxHXPmjepJsAQZPx7qjeuU3NNbVxZ7 U4Z2O+W+RhTrZd1VF+VaNuzBsd7o+MQiH+SFSW/rXk2TVVvQuNdJBhJH8Rb7TZ7TE/DD STbH6sQi2z5cTKOWZFvOq2SOMv2ZzpCBc6swNkk+RbDxP4n8If3MbdUYjIp+eCmpdVLS 7nQAzk+PfHfbBWpdneIz/Z88hs5h9i4mo+LxFb1s2QVo502Z1T5CT2+LbzMmfBedehIc NHcA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=cV0LLC+HCNdvxfmizvUcCR3HoP+4upKhCe7XAna94P4=; b=BurD9vhh5U5XnKUJd/BQ37JyHaLppmUouFi3bOC4AglYPF3EWWpYytjOozrQtSJE0Y eIrT/CBbKqCac7gCg7C2XxwQcu4vaY4TDXnST7+WsIPIJfP8xVrfWsGKVGFWOoDYQSDw 5eAfqZIh7uyVGh/EJl0YoUonAAc/zdMeXy22RivTlYuaIDLrZQXp9sIBhrvJJ1k8iSvm sjWAR4/6qOmBVLMTJITrch2aP0tMm4ooiJ1wscHcJrHJGWpSYCxVcqkkm1RuaK+CkR9r qGcexH4VgHDndSNKwEdvQIeLnXjYb5+7H/BIlNwzzzaGAx5gLhThZ+n7agMNnLzfwumf LfvA== X-Gm-Message-State: ANoB5pk0f3NUd7G0aBWJUQQj+gByDnc663LOIoBcPjDudWjWfgoJhTS4 O8Ut2YVv0puAZFprmusjy/edQ3kUTHbE X-Received: from vipin.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:479f]) (user=vipinsh job=sendgmr) by 2002:a62:b402:0:b0:56e:8f96:6b2e with SMTP id h2-20020a62b402000000b0056e8f966b2emr99339691pfn.18.1670870242747; Mon, 12 Dec 2022 10:37:22 -0800 (PST) Date: Mon, 12 Dec 2022 10:37:07 -0800 Mime-Version: 1.0 X-Mailer: git-send-email 2.39.0.rc1.256.g54fd8350bd-goog Message-ID: <20221212183720.4062037-1-vipinsh@google.com> Subject: [Patch v4 00/13] Add Hyper-v extended hypercall support in KVM From: Vipin Sharma <vipinsh@google.com> To: seanjc@google.com, pbonzini@redhat.com, vkuznets@redhat.com, dmatlack@google.com Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Vipin Sharma <vipinsh@google.com> Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1752034476398008088?= X-GMAIL-MSGID: =?utf-8?q?1752034476398008088?= |
Series |
Add Hyper-v extended hypercall support in KVM
|
|
Message
Vipin Sharma
Dec. 12, 2022, 6:37 p.m. UTC
Hi, There are two patch series combined in this one because I have rebased my patch series (patches 8 to 13) on top of Vitaly's "Hyper-V invariant TSC control feature" (patches 1 to 7). https://lore.kernel.org/kvm/87o7szouyr.fsf@ovpn-194-185.brq.redhat.com/ Vitaly's series had some small merge conflicts on the KVM queue branch I have fixed them in this series, no code changes. My patches (8 to 13) add Hyper-V extended hypercall support and selftests. v4: - Changed vm_vaddr_t to vm_paddr_t in hyperv_extended_hypercalls. - Changed ASSERT_EXIT_REASON to TEST_ASSERT_KVM_EXIT_REASON v3: https://lore.kernel.org/lkml/20221205191430.2455108-1-vipinsh@google.com/ - Rebased on top of Vitaly's "Hyper-V invariant TSC control feature" series. - Removed enabling KVM_CAP_HYPERV_ENFORCE_CPUID in hyperv_extended_hypercalls test. v2: https://lore.kernel.org/lkml/20221121234026.3037083-1-vipinsh@google.com/ - Intorduced ASSERT_EXIT_REASON macro and replaced all occurences of TEST_ASSERT for vcpu exit reason. - Skip hyperv_extended_hypercalls test if extended hypercalls are not supported by the kernel. - Rebased with latest KVM queue. - Addressed all of the comments in patch 6 of v1. v1: https://lore.kernel.org/lkml/20221105045704.2315186-1-vipinsh@google.com/ RFC: https://lore.kernel.org/lkml/20221021185916.1494314-1-vipinsh@google.com/ Vipin Sharma (6): KVM: x86: hyper-v: Use common code for hypercall userspace exit KVM: x86: hyper-v: Add extended hypercall support in Hyper-v KVM: selftests: Test Hyper-V extended hypercall enablement KVM: selftests: Replace hardcoded Linux OS id with HYPERV_LINUX_OS_ID KVM: selftests: Make vCPU exit reason test assertion common. KVM: selftests: Test Hyper-V extended hypercall exit to userspace Vitaly Kuznetsov (7): x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define KVM: x86: Add a KVM-only leaf for CPUID_8000_0007_EDX KVM: x86: Hyper-V invariant TSC control KVM: selftests: Rename 'msr->available' to 'msr->fault_exepected' in hyperv_features test KVM: selftests: Convert hyperv_features test to using KVM_X86_CPU_FEATURE() KVM: selftests: Test that values written to Hyper-V MSRs are preserved KVM: selftests: Test Hyper-V invariant TSC control arch/x86/include/asm/hyperv-tlfs.h | 3 + arch/x86/include/asm/kvm_host.h | 1 + arch/x86/kernel/cpu/mshyperv.c | 2 +- arch/x86/kvm/cpuid.c | 11 +- arch/x86/kvm/hyperv.c | 74 +++- arch/x86/kvm/hyperv.h | 27 ++ arch/x86/kvm/reverse_cpuid.h | 7 + arch/x86/kvm/x86.c | 4 +- tools/testing/selftests/kvm/.gitignore | 1 + tools/testing/selftests/kvm/Makefile | 1 + .../testing/selftests/kvm/aarch64/psci_test.c | 4 +- .../testing/selftests/kvm/include/test_util.h | 10 + .../selftests/kvm/include/x86_64/hyperv.h | 149 +++++--- .../selftests/kvm/include/x86_64/processor.h | 1 + .../kvm/lib/s390x/diag318_test_handler.c | 3 +- .../selftests/kvm/s390x/sync_regs_test.c | 15 +- .../selftests/kvm/set_memory_region_test.c | 6 +- tools/testing/selftests/kvm/x86_64/amx_test.c | 8 +- .../kvm/x86_64/cr4_cpuid_sync_test.c | 8 +- .../testing/selftests/kvm/x86_64/debug_regs.c | 2 +- .../selftests/kvm/x86_64/flds_emulation.h | 5 +- .../selftests/kvm/x86_64/hyperv_clock.c | 9 +- .../selftests/kvm/x86_64/hyperv_evmcs.c | 8 +- .../kvm/x86_64/hyperv_extended_hypercalls.c | 93 +++++ .../selftests/kvm/x86_64/hyperv_features.c | 353 +++++++++++------- .../testing/selftests/kvm/x86_64/hyperv_ipi.c | 6 +- .../selftests/kvm/x86_64/hyperv_svm_test.c | 7 +- .../selftests/kvm/x86_64/hyperv_tlb_flush.c | 14 +- .../selftests/kvm/x86_64/kvm_clock_test.c | 5 +- .../selftests/kvm/x86_64/kvm_pv_test.c | 5 +- .../selftests/kvm/x86_64/monitor_mwait_test.c | 9 +- .../kvm/x86_64/nested_exceptions_test.c | 5 +- .../selftests/kvm/x86_64/platform_info_test.c | 14 +- .../kvm/x86_64/pmu_event_filter_test.c | 6 +- tools/testing/selftests/kvm/x86_64/smm_test.c | 9 +- .../testing/selftests/kvm/x86_64/state_test.c | 8 +- .../selftests/kvm/x86_64/svm_int_ctl_test.c | 8 +- .../kvm/x86_64/svm_nested_shutdown_test.c | 7 +- .../kvm/x86_64/svm_nested_soft_inject_test.c | 6 +- .../selftests/kvm/x86_64/svm_vmcall_test.c | 6 +- .../selftests/kvm/x86_64/sync_regs_test.c | 25 +- .../kvm/x86_64/triple_fault_event_test.c | 9 +- .../selftests/kvm/x86_64/tsc_scaling_sync.c | 6 +- .../kvm/x86_64/ucna_injection_test.c | 22 +- .../selftests/kvm/x86_64/userspace_io_test.c | 6 +- .../kvm/x86_64/userspace_msr_exit_test.c | 22 +- .../kvm/x86_64/vmx_apic_access_test.c | 11 +- .../kvm/x86_64/vmx_close_while_nested_test.c | 5 +- .../selftests/kvm/x86_64/vmx_dirty_log_test.c | 7 +- .../vmx_exception_with_invalid_guest_state.c | 4 +- .../x86_64/vmx_invalid_nested_guest_state.c | 4 +- .../kvm/x86_64/vmx_nested_tsc_scaling_test.c | 6 +- .../kvm/x86_64/vmx_preemption_timer_test.c | 8 +- .../kvm/x86_64/vmx_tsc_adjust_test.c | 6 +- .../selftests/kvm/x86_64/xapic_ipi_test.c | 6 +- .../selftests/kvm/x86_64/xen_shinfo_test.c | 7 +- .../selftests/kvm/x86_64/xen_vmcall_test.c | 5 +- 57 files changed, 586 insertions(+), 493 deletions(-) create mode 100644 tools/testing/selftests/kvm/x86_64/hyperv_extended_hypercalls.c
Comments
On Mon, Dec 12, 2022 at 10:37 AM Vipin Sharma <vipinsh@google.com> wrote: > > Hi, > > There are two patch series combined in this one because I have rebased > my patch series (patches 8 to 13) on top of Vitaly's "Hyper-V invariant TSC control > feature" (patches 1 to 7). > https://lore.kernel.org/kvm/87o7szouyr.fsf@ovpn-194-185.brq.redhat.com/ > > Vitaly's series had some small merge conflicts on the KVM queue branch I > have fixed them in this series, no code changes. > > My patches (8 to 13) add Hyper-V extended hypercall support and selftests. > > v4: > - Changed vm_vaddr_t to vm_paddr_t in hyperv_extended_hypercalls. > - Changed ASSERT_EXIT_REASON to TEST_ASSERT_KVM_EXIT_REASON > > v3: https://lore.kernel.org/lkml/20221205191430.2455108-1-vipinsh@google.com/ > - Rebased on top of Vitaly's "Hyper-V invariant TSC control feature" > series. > - Removed enabling KVM_CAP_HYPERV_ENFORCE_CPUID in > hyperv_extended_hypercalls test. > > > v2: https://lore.kernel.org/lkml/20221121234026.3037083-1-vipinsh@google.com/ > - Intorduced ASSERT_EXIT_REASON macro and replaced all occurences of > TEST_ASSERT for vcpu exit reason. > - Skip hyperv_extended_hypercalls test if extended hypercalls are not > supported by the kernel. > - Rebased with latest KVM queue. > - Addressed all of the comments in patch 6 of v1. > > v1: https://lore.kernel.org/lkml/20221105045704.2315186-1-vipinsh@google.com/ > > RFC: https://lore.kernel.org/lkml/20221021185916.1494314-1-vipinsh@google.com/ > > Vipin Sharma (6): > KVM: x86: hyper-v: Use common code for hypercall userspace exit > KVM: x86: hyper-v: Add extended hypercall support in Hyper-v > KVM: selftests: Test Hyper-V extended hypercall enablement > KVM: selftests: Replace hardcoded Linux OS id with HYPERV_LINUX_OS_ID > KVM: selftests: Make vCPU exit reason test assertion common. > KVM: selftests: Test Hyper-V extended hypercall exit to userspace > > Vitaly Kuznetsov (7): > x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define > KVM: x86: Add a KVM-only leaf for CPUID_8000_0007_EDX > KVM: x86: Hyper-V invariant TSC control > KVM: selftests: Rename 'msr->available' to 'msr->fault_exepected' in > hyperv_features test > KVM: selftests: Convert hyperv_features test to using > KVM_X86_CPU_FEATURE() > KVM: selftests: Test that values written to Hyper-V MSRs are preserved > KVM: selftests: Test Hyper-V invariant TSC control > > arch/x86/include/asm/hyperv-tlfs.h | 3 + > arch/x86/include/asm/kvm_host.h | 1 + > arch/x86/kernel/cpu/mshyperv.c | 2 +- > arch/x86/kvm/cpuid.c | 11 +- > arch/x86/kvm/hyperv.c | 74 +++- > arch/x86/kvm/hyperv.h | 27 ++ > arch/x86/kvm/reverse_cpuid.h | 7 + > arch/x86/kvm/x86.c | 4 +- > tools/testing/selftests/kvm/.gitignore | 1 + > tools/testing/selftests/kvm/Makefile | 1 + > .../testing/selftests/kvm/aarch64/psci_test.c | 4 +- > .../testing/selftests/kvm/include/test_util.h | 10 + > .../selftests/kvm/include/x86_64/hyperv.h | 149 +++++--- > .../selftests/kvm/include/x86_64/processor.h | 1 + > .../kvm/lib/s390x/diag318_test_handler.c | 3 +- > .../selftests/kvm/s390x/sync_regs_test.c | 15 +- > .../selftests/kvm/set_memory_region_test.c | 6 +- > tools/testing/selftests/kvm/x86_64/amx_test.c | 8 +- > .../kvm/x86_64/cr4_cpuid_sync_test.c | 8 +- > .../testing/selftests/kvm/x86_64/debug_regs.c | 2 +- > .../selftests/kvm/x86_64/flds_emulation.h | 5 +- > .../selftests/kvm/x86_64/hyperv_clock.c | 9 +- > .../selftests/kvm/x86_64/hyperv_evmcs.c | 8 +- > .../kvm/x86_64/hyperv_extended_hypercalls.c | 93 +++++ > .../selftests/kvm/x86_64/hyperv_features.c | 353 +++++++++++------- > .../testing/selftests/kvm/x86_64/hyperv_ipi.c | 6 +- > .../selftests/kvm/x86_64/hyperv_svm_test.c | 7 +- > .../selftests/kvm/x86_64/hyperv_tlb_flush.c | 14 +- > .../selftests/kvm/x86_64/kvm_clock_test.c | 5 +- > .../selftests/kvm/x86_64/kvm_pv_test.c | 5 +- > .../selftests/kvm/x86_64/monitor_mwait_test.c | 9 +- > .../kvm/x86_64/nested_exceptions_test.c | 5 +- > .../selftests/kvm/x86_64/platform_info_test.c | 14 +- > .../kvm/x86_64/pmu_event_filter_test.c | 6 +- > tools/testing/selftests/kvm/x86_64/smm_test.c | 9 +- > .../testing/selftests/kvm/x86_64/state_test.c | 8 +- > .../selftests/kvm/x86_64/svm_int_ctl_test.c | 8 +- > .../kvm/x86_64/svm_nested_shutdown_test.c | 7 +- > .../kvm/x86_64/svm_nested_soft_inject_test.c | 6 +- > .../selftests/kvm/x86_64/svm_vmcall_test.c | 6 +- > .../selftests/kvm/x86_64/sync_regs_test.c | 25 +- > .../kvm/x86_64/triple_fault_event_test.c | 9 +- > .../selftests/kvm/x86_64/tsc_scaling_sync.c | 6 +- > .../kvm/x86_64/ucna_injection_test.c | 22 +- > .../selftests/kvm/x86_64/userspace_io_test.c | 6 +- > .../kvm/x86_64/userspace_msr_exit_test.c | 22 +- > .../kvm/x86_64/vmx_apic_access_test.c | 11 +- > .../kvm/x86_64/vmx_close_while_nested_test.c | 5 +- > .../selftests/kvm/x86_64/vmx_dirty_log_test.c | 7 +- > .../vmx_exception_with_invalid_guest_state.c | 4 +- > .../x86_64/vmx_invalid_nested_guest_state.c | 4 +- > .../kvm/x86_64/vmx_nested_tsc_scaling_test.c | 6 +- > .../kvm/x86_64/vmx_preemption_timer_test.c | 8 +- > .../kvm/x86_64/vmx_tsc_adjust_test.c | 6 +- > .../selftests/kvm/x86_64/xapic_ipi_test.c | 6 +- > .../selftests/kvm/x86_64/xen_shinfo_test.c | 7 +- > .../selftests/kvm/x86_64/xen_vmcall_test.c | 5 +- > 57 files changed, 586 insertions(+), 493 deletions(-) > create mode 100644 tools/testing/selftests/kvm/x86_64/hyperv_extended_hypercalls.c > > -- > 2.39.0.rc1.256.g54fd8350bd-goog > Hi Paolo, Sean Is this one on your todo for 6.3? Thanks Vipin
On Mon, 12 Dec 2022 10:37:07 -0800, Vipin Sharma wrote: > There are two patch series combined in this one because I have rebased > my patch series (patches 8 to 13) on top of Vitaly's "Hyper-V invariant TSC control > feature" (patches 1 to 7). > https://lore.kernel.org/kvm/87o7szouyr.fsf@ovpn-194-185.brq.redhat.com/ > > Vitaly's series had some small merge conflicts on the KVM queue branch I > have fixed them in this series, no code changes. > > [...] Applied 8-11 and 13 to kvm-x86 misc. 1-7 were already merged, and I don't want to carry the sweeping TEST_ASSERT_KVM_EXIT_REASON() change, at least not in "misc", and I definitely don't want to grab it without Cc'ing the other arch maintainers. I'll follow up in that patch. [08/13] KVM: x86: hyper-v: Use common code for hypercall userspace exit https://github.com/kvm-x86/linux/commit/1a9df3262a63 [09/13] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v https://github.com/kvm-x86/linux/commit/db9cf24cea69 [10/13] KVM: selftests: Test Hyper-V extended hypercall enablement https://github.com/kvm-x86/linux/commit/c4a46627e5a8 [11/13] KVM: selftests: Replace hardcoded Linux OS id with HYPERV_LINUX_OS_ID https://github.com/kvm-x86/linux/commit/f65092015a83 [13/13] KVM: selftests: Test Hyper-V extended hypercall exit to userspace https://github.com/kvm-x86/linux/commit/60325261235a -- https://github.com/kvm-x86/linux/tree/next https://github.com/kvm-x86/linux/tree/fixes