lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHVum0cT5a+NyXTDv_rrfRUPW+8dvMz-bQXTHLAXXiwi+F+XSw@mail.gmail.com>
Date:   Tue, 3 Jan 2023 16:33:05 -0800
From:   Vipin Sharma <vipinsh@...gle.com>
To:     seanjc@...gle.com, pbonzini@...hat.com, vkuznets@...hat.com,
        dmatlack@...gle.com
Cc:     kvm@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [Patch v4 00/13] Add Hyper-v extended hypercall support in KVM

On Mon, Dec 12, 2022 at 10:37 AM Vipin Sharma <vipinsh@...gle.com> wrote:
>
> Hi,
>
> There are two patch series combined in this one because I have rebased
> my patch series (patches 8 to 13) on top of Vitaly's "Hyper-V invariant TSC control
> feature" (patches 1 to 7).
> https://lore.kernel.org/kvm/87o7szouyr.fsf@ovpn-194-185.brq.redhat.com/
>
> Vitaly's series had some small merge conflicts on the KVM queue branch I
> have fixed them in this series, no code changes.
>
> My patches (8 to 13) add Hyper-V extended hypercall support and selftests.
>
> v4:
> - Changed vm_vaddr_t to vm_paddr_t in hyperv_extended_hypercalls.
> - Changed ASSERT_EXIT_REASON to TEST_ASSERT_KVM_EXIT_REASON
>
> v3: https://lore.kernel.org/lkml/20221205191430.2455108-1-vipinsh@google.com/
> - Rebased on top of Vitaly's "Hyper-V invariant TSC control feature"
>   series.
> - Removed enabling KVM_CAP_HYPERV_ENFORCE_CPUID in
>   hyperv_extended_hypercalls test.
>
>
> v2: https://lore.kernel.org/lkml/20221121234026.3037083-1-vipinsh@google.com/
> - Intorduced ASSERT_EXIT_REASON macro and replaced all occurences of
>   TEST_ASSERT for vcpu exit reason.
> - Skip hyperv_extended_hypercalls test if extended hypercalls are not
>   supported by the kernel.
> - Rebased with latest KVM queue.
> - Addressed all of the comments in patch 6 of v1.
>
> v1: https://lore.kernel.org/lkml/20221105045704.2315186-1-vipinsh@google.com/
>
> RFC: https://lore.kernel.org/lkml/20221021185916.1494314-1-vipinsh@google.com/
>
> Vipin Sharma (6):
>   KVM: x86: hyper-v: Use common code for hypercall userspace exit
>   KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
>   KVM: selftests: Test Hyper-V extended hypercall enablement
>   KVM: selftests: Replace hardcoded Linux OS id with HYPERV_LINUX_OS_ID
>   KVM: selftests: Make vCPU exit reason test assertion common.
>   KVM: selftests: Test Hyper-V extended hypercall exit to userspace
>
> Vitaly Kuznetsov (7):
>   x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define
>   KVM: x86: Add a KVM-only leaf for CPUID_8000_0007_EDX
>   KVM: x86: Hyper-V invariant TSC control
>   KVM: selftests: Rename 'msr->available' to 'msr->fault_exepected' in
>     hyperv_features test
>   KVM: selftests: Convert hyperv_features test to using
>     KVM_X86_CPU_FEATURE()
>   KVM: selftests: Test that values written to Hyper-V MSRs are preserved
>   KVM: selftests: Test Hyper-V invariant TSC control
>
>  arch/x86/include/asm/hyperv-tlfs.h            |   3 +
>  arch/x86/include/asm/kvm_host.h               |   1 +
>  arch/x86/kernel/cpu/mshyperv.c                |   2 +-
>  arch/x86/kvm/cpuid.c                          |  11 +-
>  arch/x86/kvm/hyperv.c                         |  74 +++-
>  arch/x86/kvm/hyperv.h                         |  27 ++
>  arch/x86/kvm/reverse_cpuid.h                  |   7 +
>  arch/x86/kvm/x86.c                            |   4 +-
>  tools/testing/selftests/kvm/.gitignore        |   1 +
>  tools/testing/selftests/kvm/Makefile          |   1 +
>  .../testing/selftests/kvm/aarch64/psci_test.c |   4 +-
>  .../testing/selftests/kvm/include/test_util.h |  10 +
>  .../selftests/kvm/include/x86_64/hyperv.h     | 149 +++++---
>  .../selftests/kvm/include/x86_64/processor.h  |   1 +
>  .../kvm/lib/s390x/diag318_test_handler.c      |   3 +-
>  .../selftests/kvm/s390x/sync_regs_test.c      |  15 +-
>  .../selftests/kvm/set_memory_region_test.c    |   6 +-
>  tools/testing/selftests/kvm/x86_64/amx_test.c |   8 +-
>  .../kvm/x86_64/cr4_cpuid_sync_test.c          |   8 +-
>  .../testing/selftests/kvm/x86_64/debug_regs.c |   2 +-
>  .../selftests/kvm/x86_64/flds_emulation.h     |   5 +-
>  .../selftests/kvm/x86_64/hyperv_clock.c       |   9 +-
>  .../selftests/kvm/x86_64/hyperv_evmcs.c       |   8 +-
>  .../kvm/x86_64/hyperv_extended_hypercalls.c   |  93 +++++
>  .../selftests/kvm/x86_64/hyperv_features.c    | 353 +++++++++++-------
>  .../testing/selftests/kvm/x86_64/hyperv_ipi.c |   6 +-
>  .../selftests/kvm/x86_64/hyperv_svm_test.c    |   7 +-
>  .../selftests/kvm/x86_64/hyperv_tlb_flush.c   |  14 +-
>  .../selftests/kvm/x86_64/kvm_clock_test.c     |   5 +-
>  .../selftests/kvm/x86_64/kvm_pv_test.c        |   5 +-
>  .../selftests/kvm/x86_64/monitor_mwait_test.c |   9 +-
>  .../kvm/x86_64/nested_exceptions_test.c       |   5 +-
>  .../selftests/kvm/x86_64/platform_info_test.c |  14 +-
>  .../kvm/x86_64/pmu_event_filter_test.c        |   6 +-
>  tools/testing/selftests/kvm/x86_64/smm_test.c |   9 +-
>  .../testing/selftests/kvm/x86_64/state_test.c |   8 +-
>  .../selftests/kvm/x86_64/svm_int_ctl_test.c   |   8 +-
>  .../kvm/x86_64/svm_nested_shutdown_test.c     |   7 +-
>  .../kvm/x86_64/svm_nested_soft_inject_test.c  |   6 +-
>  .../selftests/kvm/x86_64/svm_vmcall_test.c    |   6 +-
>  .../selftests/kvm/x86_64/sync_regs_test.c     |  25 +-
>  .../kvm/x86_64/triple_fault_event_test.c      |   9 +-
>  .../selftests/kvm/x86_64/tsc_scaling_sync.c   |   6 +-
>  .../kvm/x86_64/ucna_injection_test.c          |  22 +-
>  .../selftests/kvm/x86_64/userspace_io_test.c  |   6 +-
>  .../kvm/x86_64/userspace_msr_exit_test.c      |  22 +-
>  .../kvm/x86_64/vmx_apic_access_test.c         |  11 +-
>  .../kvm/x86_64/vmx_close_while_nested_test.c  |   5 +-
>  .../selftests/kvm/x86_64/vmx_dirty_log_test.c |   7 +-
>  .../vmx_exception_with_invalid_guest_state.c  |   4 +-
>  .../x86_64/vmx_invalid_nested_guest_state.c   |   4 +-
>  .../kvm/x86_64/vmx_nested_tsc_scaling_test.c  |   6 +-
>  .../kvm/x86_64/vmx_preemption_timer_test.c    |   8 +-
>  .../kvm/x86_64/vmx_tsc_adjust_test.c          |   6 +-
>  .../selftests/kvm/x86_64/xapic_ipi_test.c     |   6 +-
>  .../selftests/kvm/x86_64/xen_shinfo_test.c    |   7 +-
>  .../selftests/kvm/x86_64/xen_vmcall_test.c    |   5 +-
>  57 files changed, 586 insertions(+), 493 deletions(-)
>  create mode 100644 tools/testing/selftests/kvm/x86_64/hyperv_extended_hypercalls.c
>
> --
> 2.39.0.rc1.256.g54fd8350bd-goog
>

Hi Paolo, Sean

Is this one on your todo for 6.3?

Thanks
Vipin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ