From: Janis Schoetterl-Glausch <scgl@linux.ibm.com>
To: Thomas Huth <thuth@redhat.com>,
Janosch Frank <frankja@linux.ibm.com>,
Claudio Imbrenda <imbrenda@linux.ibm.com>
Cc: Janis Schoetterl-Glausch <scgl@linux.ibm.com>,
David Hildenbrand <david@redhat.com>,
kvm@vger.kernel.org, linux-s390@vger.kernel.org
Subject: [kvm-unit-tests PATCH v7 1/3] s390x: Give name to return value of tprot()
Date: Mon, 2 May 2022 17:40:59 +0200 [thread overview]
Message-ID: <20220502154101.3663941-2-scgl@linux.ibm.com> (raw)
In-Reply-To: <20220502154101.3663941-1-scgl@linux.ibm.com>
Improve readability by making the return value of tprot() an enum.
No functional change intended.
Signed-off-by: Janis Schoetterl-Glausch <scgl@linux.ibm.com>
Reviewed-by: Claudio Imbrenda <imbrenda@linux.ibm.com>
Reviewed-by: Janosch Frank <frankja@linux.ibm.com>
---
lib/s390x/asm/arch_def.h | 11 +++++++++--
lib/s390x/sclp.c | 6 +++---
s390x/tprot.c | 24 ++++++++++++------------
3 files changed, 24 insertions(+), 17 deletions(-)
diff --git a/lib/s390x/asm/arch_def.h b/lib/s390x/asm/arch_def.h
index bab3c374..46c370e6 100644
--- a/lib/s390x/asm/arch_def.h
+++ b/lib/s390x/asm/arch_def.h
@@ -228,7 +228,14 @@ static inline uint64_t stidp(void)
return cpuid;
}
-static inline int tprot(unsigned long addr, char access_key)
+enum tprot_permission {
+ TPROT_READ_WRITE = 0,
+ TPROT_READ = 1,
+ TPROT_RW_PROTECTED = 2,
+ TPROT_TRANSL_UNAVAIL = 3,
+};
+
+static inline enum tprot_permission tprot(unsigned long addr, char access_key)
{
int cc;
@@ -237,7 +244,7 @@ static inline int tprot(unsigned long addr, char access_key)
" ipm %0\n"
" srl %0,28\n"
: "=d" (cc) : "a" (addr), "a" (access_key << 4) : "cc");
- return cc;
+ return (enum tprot_permission)cc;
}
static inline void lctlg(int cr, uint64_t value)
diff --git a/lib/s390x/sclp.c b/lib/s390x/sclp.c
index 33985eb4..b8204c5f 100644
--- a/lib/s390x/sclp.c
+++ b/lib/s390x/sclp.c
@@ -198,7 +198,7 @@ int sclp_service_call(unsigned int command, void *sccb)
void sclp_memory_setup(void)
{
uint64_t rnmax, rnsize;
- int cc;
+ enum tprot_permission permission;
assert(read_info);
@@ -222,9 +222,9 @@ void sclp_memory_setup(void)
/* probe for r/w memory up to max memory size */
while (ram_size < max_ram_size) {
expect_pgm_int();
- cc = tprot(ram_size + storage_increment_size - 1, 0);
+ permission = tprot(ram_size + storage_increment_size - 1, 0);
/* stop once we receive an exception or have protected memory */
- if (clear_pgm_int() || cc != 0)
+ if (clear_pgm_int() || permission != TPROT_READ_WRITE)
break;
ram_size += storage_increment_size;
}
diff --git a/s390x/tprot.c b/s390x/tprot.c
index 460a0db7..8eb91c18 100644
--- a/s390x/tprot.c
+++ b/s390x/tprot.c
@@ -20,26 +20,26 @@ static uint8_t pagebuf[PAGE_SIZE] __attribute__((aligned(PAGE_SIZE)));
static void test_tprot_rw(void)
{
- int cc;
+ enum tprot_permission permission;
report_prefix_push("Page read/writeable");
- cc = tprot((unsigned long)pagebuf, 0);
- report(cc == 0, "CC = 0");
+ permission = tprot((unsigned long)pagebuf, 0);
+ report(permission == TPROT_READ_WRITE, "CC = 0");
report_prefix_pop();
}
static void test_tprot_ro(void)
{
- int cc;
+ enum tprot_permission permission;
report_prefix_push("Page readonly");
protect_dat_entry(pagebuf, PAGE_ENTRY_P, 5);
- cc = tprot((unsigned long)pagebuf, 0);
- report(cc == 1, "CC = 1");
+ permission = tprot((unsigned long)pagebuf, 0);
+ report(permission == TPROT_READ, "CC = 1");
unprotect_dat_entry(pagebuf, PAGE_ENTRY_P, 5);
@@ -48,28 +48,28 @@ static void test_tprot_ro(void)
static void test_tprot_low_addr_prot(void)
{
- int cc;
+ enum tprot_permission permission;
report_prefix_push("low-address protection");
low_prot_enable();
- cc = tprot(0, 0);
+ permission = tprot(0, 0);
low_prot_disable();
- report(cc == 1, "CC = 1");
+ report(permission == TPROT_READ, "CC = 1");
report_prefix_pop();
}
static void test_tprot_transl_unavail(void)
{
- int cc;
+ enum tprot_permission permission;
report_prefix_push("Page translation unavailable");
protect_dat_entry(pagebuf, PAGE_ENTRY_I, 5);
- cc = tprot((unsigned long)pagebuf, 0);
- report(cc == 3, "CC = 3");
+ permission = tprot((unsigned long)pagebuf, 0);
+ report(permission == TPROT_TRANSL_UNAVAIL, "CC = 3");
unprotect_dat_entry(pagebuf, PAGE_ENTRY_I, 5);
--
2.33.1
next prev parent reply other threads:[~2022-05-02 15:41 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-05-02 15:40 [kvm-unit-tests PATCH v7 0/3] s390x: Test effect of storage keys on some instructions Janis Schoetterl-Glausch
2022-05-02 15:40 ` Janis Schoetterl-Glausch [this message]
2022-05-04 13:23 ` [kvm-unit-tests PATCH v7 1/3] s390x: Give name to return value of tprot() Thomas Huth
2022-05-02 15:41 ` [kvm-unit-tests PATCH v7 2/3] s390x: Test effect of storage keys on some instructions Janis Schoetterl-Glausch
2022-05-04 12:46 ` Janosch Frank
2022-05-04 13:29 ` Thomas Huth
2022-05-02 15:41 ` [kvm-unit-tests PATCH v7 3/3] Disable s390x skey test in GitLab CI Janis Schoetterl-Glausch
2022-05-05 13:16 ` [kvm-unit-tests PATCH v7 0/3] s390x: Test effect of storage keys on some instructions Claudio Imbrenda
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20220502154101.3663941-2-scgl@linux.ibm.com \
--to=scgl@linux.ibm.com \
--cc=david@redhat.com \
--cc=frankja@linux.ibm.com \
--cc=imbrenda@linux.ibm.com \
--cc=kvm@vger.kernel.org \
--cc=linux-s390@vger.kernel.org \
--cc=thuth@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox