Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp348705rwe; Wed, 31 Aug 2022 04:04:16 -0700 (PDT) X-Google-Smtp-Source: AA6agR7M/TqBAFu9RFu4k/PvkYYvedZvcvPdHeGHXGppplNmFsdaNJO8qcmGgDRWs3wLi6y5O8mU X-Received: by 2002:a17:907:60c7:b0:731:17e4:7fcc with SMTP id hv7-20020a17090760c700b0073117e47fccmr20003427ejc.73.1661943856493; Wed, 31 Aug 2022 04:04:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661943856; cv=none; d=google.com; s=arc-20160816; b=AC3SnX3me0nSVFHu+Bk6VTE/dr47QzHApdY6IABdGjus7bFcMCptmjTOGUMuHUQcbT CGE1cBAxRIo7pKmLKXDiLXGQWco0MNcJfSsyCSRWlQepp3DvzR6+2ffPDisuhvRNnCC2 ewKIbmPuXFJVmRcHNtYr/3jxve0qXzy8vitICd1srVX8dbXAJ5fB7E+dzg4bQWRDwbvS HXMeA8gEoXjfy9Xu+ti0rA6sYCQcZvSF6tIkxoC+QUT+20CNbpa2wjISX6bOKgNpz895 uvdQvCGG84EMKO4iILF4a7EnllsT+RTfZ8GFkHhPq8DEP7AgqMznRxfmJMRKbBD27Sle 25Rw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=glJVeUkKg3tox5zcMh5W5s7ejcgNPbJiczeeGyhy1x0=; b=Tqs6O6oUL+yxFtAUiK49dxxI7lAMPx/em8X3RoLXsUac6/NEJ+p89oL5BlK7WuCzVO 69AU/Eal1IUwg/UsGOKAmwmQySD1REc56EidzxtRAax4KREywC0bOrIBiDhO2cnrXFQr QkL/xiEgjtDOkRIxJIxFCAk1YfpE6zzEV6Ja54VwbyuVN6YxcgJTu94IvrxzUZLJJewu BRsWg+JwZP7uQugImGITzt0uEBJoZZQrl+qTOUyRAFIMJbsSMYDmQQUufhdR5/DHXOKN 2JzOQLzoyFlR1TciBL5ksWqb8UuQQDNRhwPZmtIOHf1S30HGv1fLOFnAN6vstfgET9gF FOFA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ZyytIsXR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hd39-20020a17090796a700b0072abb95e8e4si15074003ejc.598.2022.08.31.04.03.51; Wed, 31 Aug 2022 04:04:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ZyytIsXR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229790AbiHaKo3 (ORCPT + 99 others); Wed, 31 Aug 2022 06:44:29 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35150 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229655AbiHaKoU (ORCPT ); Wed, 31 Aug 2022 06:44:20 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3482DC9E93 for ; Wed, 31 Aug 2022 03:44:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1661942658; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=glJVeUkKg3tox5zcMh5W5s7ejcgNPbJiczeeGyhy1x0=; b=ZyytIsXRgoj6WVrXwQi5xszOVbr/qlQ09sTcSO4Ru01+Y/RQsEhAVbF1YRaIN2vRcOHNtJ nwC5++JnSsi52CpTAIi34XwNXyHrxjmRc7cjfSZF7ZYJDoLAuLygS+zZhkG7GCrZwyZlog 6jtu7YQh+F/ctfdS6uQ2Sml6yoK5QXA= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-446-abKaBme1Mkmze0NZBgk68g-1; Wed, 31 Aug 2022 06:44:15 -0400 X-MC-Unique: abKaBme1Mkmze0NZBgk68g-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.rdu2.redhat.com [10.11.54.8]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id C62F83C0D865; Wed, 31 Aug 2022 10:44:14 +0000 (UTC) Received: from starship (unknown [10.40.194.96]) by smtp.corp.redhat.com (Postfix) with ESMTP id 8E14CC15BB3; Wed, 31 Aug 2022 10:44:12 +0000 (UTC) Message-ID: <4ad924e282fd9a387a9c40d4780a1b9f2eaf4f06.camel@redhat.com> Subject: Re: [PATCH v2 2/3] KVM: selftests: Rename 'msr->availble' to 'msr->should_not_gp' in hyperv_features test From: Maxim Levitsky To: Vitaly Kuznetsov , kvm@vger.kernel.org, Paolo Bonzini , Sean Christopherson Cc: Wanpeng Li , Jim Mattson , Michael Kelley , linux-hyperv@vger.kernel.org, linux-kernel@vger.kernel.org Date: Wed, 31 Aug 2022 13:44:11 +0300 In-Reply-To: <20220831085009.1627523-3-vkuznets@redhat.com> References: <20220831085009.1627523-1-vkuznets@redhat.com> <20220831085009.1627523-3-vkuznets@redhat.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.5 (3.36.5-2.fc32) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.85 on 10.11.54.8 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 2022-08-31 at 10:50 +0200, Vitaly Kuznetsov wrote: > It may not be clear what 'msr->availble' means. The test actually > checks that accessing the particular MSR doesn't cause #GP, rename > the varialble accordingly. > > Suggested-by: Maxim Levitsky > Signed-off-by: Vitaly Kuznetsov > --- > .../selftests/kvm/x86_64/hyperv_features.c | 92 +++++++++---------- > 1 file changed, 46 insertions(+), 46 deletions(-) > > diff --git a/tools/testing/selftests/kvm/x86_64/hyperv_features.c b/tools/testing/selftests/kvm/x86_64/hyperv_features.c > index 79ab0152d281..4ec4776662a4 100644 > --- a/tools/testing/selftests/kvm/x86_64/hyperv_features.c > +++ b/tools/testing/selftests/kvm/x86_64/hyperv_features.c > @@ -33,7 +33,7 @@ static inline uint8_t hypercall(u64 control, vm_vaddr_t input_address, > > struct msr_data { > uint32_t idx; > - bool available; > + bool should_not_gp; > bool write; > u64 write_val; > }; > @@ -56,7 +56,7 @@ static void guest_msr(struct msr_data *msr) > else > vector = wrmsr_safe(msr->idx, msr->write_val); > > - if (msr->available) > + if (msr->should_not_gp) > GUEST_ASSERT_2(!vector, msr->idx, vector); > else > GUEST_ASSERT_2(vector == GP_VECTOR, msr->idx, vector); > @@ -153,12 +153,12 @@ static void guest_test_msrs_access(void) > */ > msr->idx = HV_X64_MSR_GUEST_OS_ID; > msr->write = 0; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > case 1: > msr->idx = HV_X64_MSR_HYPERCALL; > msr->write = 0; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > case 2: > feat->eax |= HV_MSR_HYPERCALL_AVAILABLE; > @@ -169,116 +169,116 @@ static void guest_test_msrs_access(void) > msr->idx = HV_X64_MSR_GUEST_OS_ID; > msr->write = 1; > msr->write_val = LINUX_OS_ID; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > case 3: > msr->idx = HV_X64_MSR_GUEST_OS_ID; > msr->write = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > case 4: > msr->idx = HV_X64_MSR_HYPERCALL; > msr->write = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > > case 5: > msr->idx = HV_X64_MSR_VP_RUNTIME; > msr->write = 0; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > case 6: > feat->eax |= HV_MSR_VP_RUNTIME_AVAILABLE; > msr->idx = HV_X64_MSR_VP_RUNTIME; > msr->write = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > case 7: > /* Read only */ > msr->idx = HV_X64_MSR_VP_RUNTIME; > msr->write = 1; > msr->write_val = 1; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > > case 8: > msr->idx = HV_X64_MSR_TIME_REF_COUNT; > msr->write = 0; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > case 9: > feat->eax |= HV_MSR_TIME_REF_COUNT_AVAILABLE; > msr->idx = HV_X64_MSR_TIME_REF_COUNT; > msr->write = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > case 10: > /* Read only */ > msr->idx = HV_X64_MSR_TIME_REF_COUNT; > msr->write = 1; > msr->write_val = 1; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > > case 11: > msr->idx = HV_X64_MSR_VP_INDEX; > msr->write = 0; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > case 12: > feat->eax |= HV_MSR_VP_INDEX_AVAILABLE; > msr->idx = HV_X64_MSR_VP_INDEX; > msr->write = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > case 13: > /* Read only */ > msr->idx = HV_X64_MSR_VP_INDEX; > msr->write = 1; > msr->write_val = 1; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > > case 14: > msr->idx = HV_X64_MSR_RESET; > msr->write = 0; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > case 15: > feat->eax |= HV_MSR_RESET_AVAILABLE; > msr->idx = HV_X64_MSR_RESET; > msr->write = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > case 16: > msr->idx = HV_X64_MSR_RESET; > msr->write = 1; > msr->write_val = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > > case 17: > msr->idx = HV_X64_MSR_REFERENCE_TSC; > msr->write = 0; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > case 18: > feat->eax |= HV_MSR_REFERENCE_TSC_AVAILABLE; > msr->idx = HV_X64_MSR_REFERENCE_TSC; > msr->write = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > case 19: > msr->idx = HV_X64_MSR_REFERENCE_TSC; > msr->write = 1; > msr->write_val = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > > case 20: > msr->idx = HV_X64_MSR_EOM; > msr->write = 0; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > case 21: > /* > @@ -287,145 +287,145 @@ static void guest_test_msrs_access(void) > */ > msr->idx = HV_X64_MSR_EOM; > msr->write = 0; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > case 22: > feat->eax |= HV_MSR_SYNIC_AVAILABLE; > msr->idx = HV_X64_MSR_EOM; > msr->write = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > case 23: > msr->idx = HV_X64_MSR_EOM; > msr->write = 1; > msr->write_val = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > > case 24: > msr->idx = HV_X64_MSR_STIMER0_CONFIG; > msr->write = 0; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > case 25: > feat->eax |= HV_MSR_SYNTIMER_AVAILABLE; > msr->idx = HV_X64_MSR_STIMER0_CONFIG; > msr->write = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > case 26: > msr->idx = HV_X64_MSR_STIMER0_CONFIG; > msr->write = 1; > msr->write_val = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > case 27: > /* Direct mode test */ > msr->idx = HV_X64_MSR_STIMER0_CONFIG; > msr->write = 1; > msr->write_val = 1 << 12; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > case 28: > feat->edx |= HV_STIMER_DIRECT_MODE_AVAILABLE; > msr->idx = HV_X64_MSR_STIMER0_CONFIG; > msr->write = 1; > msr->write_val = 1 << 12; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > > case 29: > msr->idx = HV_X64_MSR_EOI; > msr->write = 0; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > case 30: > feat->eax |= HV_MSR_APIC_ACCESS_AVAILABLE; > msr->idx = HV_X64_MSR_EOI; > msr->write = 1; > msr->write_val = 1; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > > case 31: > msr->idx = HV_X64_MSR_TSC_FREQUENCY; > msr->write = 0; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > case 32: > feat->eax |= HV_ACCESS_FREQUENCY_MSRS; > msr->idx = HV_X64_MSR_TSC_FREQUENCY; > msr->write = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > case 33: > /* Read only */ > msr->idx = HV_X64_MSR_TSC_FREQUENCY; > msr->write = 1; > msr->write_val = 1; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > > case 34: > msr->idx = HV_X64_MSR_REENLIGHTENMENT_CONTROL; > msr->write = 0; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > case 35: > feat->eax |= HV_ACCESS_REENLIGHTENMENT; > msr->idx = HV_X64_MSR_REENLIGHTENMENT_CONTROL; > msr->write = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > case 36: > msr->idx = HV_X64_MSR_REENLIGHTENMENT_CONTROL; > msr->write = 1; > msr->write_val = 1; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > case 37: > /* Can only write '0' */ > msr->idx = HV_X64_MSR_TSC_EMULATION_STATUS; > msr->write = 1; > msr->write_val = 1; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > > case 38: > msr->idx = HV_X64_MSR_CRASH_P0; > msr->write = 0; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > case 39: > feat->edx |= HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE; > msr->idx = HV_X64_MSR_CRASH_P0; > msr->write = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > case 40: > msr->idx = HV_X64_MSR_CRASH_P0; > msr->write = 1; > msr->write_val = 1; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > > case 41: > msr->idx = HV_X64_MSR_SYNDBG_STATUS; > msr->write = 0; > - msr->available = 0; > + msr->should_not_gp = 0; > break; > case 42: > feat->edx |= HV_FEATURE_DEBUG_MSRS_AVAILABLE; > dbg->eax |= HV_X64_SYNDBG_CAP_ALLOW_KERNEL_DEBUGGING; > msr->idx = HV_X64_MSR_SYNDBG_STATUS; > msr->write = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > case 43: > msr->idx = HV_X64_MSR_SYNDBG_STATUS; > msr->write = 1; > msr->write_val = 0; > - msr->available = 1; > + msr->should_not_gp = 1; > break; > > case 44: Thanks, Reviewed-by: Maxim Levitsky Best regards, Maxim Levitsky