From: Claudio Imbrenda <imbrenda@linux.ibm.com>
To: Janis Schoetterl-Glausch <scgl@linux.ibm.com>
Cc: Thomas Huth <thuth@redhat.com>,
Janosch Frank <frankja@linux.ibm.com>,
David Hildenbrand <david@redhat.com>,
kvm@vger.kernel.org, linux-s390@vger.kernel.org
Subject: Re: [kvm-unit-tests PATCH 3/3] s390x: Rework TEID decoding and usage
Date: Tue, 24 May 2022 16:40:30 +0200 [thread overview]
Message-ID: <20220524164030.6adb45bf@p-imbrenda> (raw)
In-Reply-To: <20220520190850.3445768-4-scgl@linux.ibm.com>
On Fri, 20 May 2022 21:08:50 +0200
Janis Schoetterl-Glausch <scgl@linux.ibm.com> wrote:
> The translation-exception identification (TEID) contains information to
> identify the cause of certain program exceptions, including translation
> exceptions occurring during dynamic address translation, as well as
> protection exceptions.
> The meaning of fields in the TEID is complex, depending on the exception
> occurring and various potentially installed facilities.
>
> Rework the type describing the TEID, in order to ease decoding.
> Change the existing code interpreting the TEID and extend it to take the
> installed suppression-on-protection facility into account.
>
> Signed-off-by: Janis Schoetterl-Glausch <scgl@linux.ibm.com>
> ---
> lib/s390x/asm/interrupt.h | 66 ++++++++++++++++++++++++++--------
> lib/s390x/fault.h | 30 ++++------------
> lib/s390x/fault.c | 74 +++++++++++++++++++++++++++------------
> lib/s390x/interrupt.c | 2 +-
> s390x/edat.c | 20 +++++++----
> 5 files changed, 124 insertions(+), 68 deletions(-)
>
> diff --git a/lib/s390x/asm/interrupt.h b/lib/s390x/asm/interrupt.h
> index d9ab0bd7..8d5bfbf9 100644
> --- a/lib/s390x/asm/interrupt.h
> +++ b/lib/s390x/asm/interrupt.h
> @@ -20,23 +20,61 @@
>
> union teid {
> unsigned long val;
> - struct {
> - unsigned long addr:52;
> - unsigned long fetch:1;
> - unsigned long store:1;
> - unsigned long reserved:6;
> - unsigned long acc_list_prot:1;
> - /*
> - * depending on the exception and the installed facilities,
> - * the m field can indicate several different things,
> - * including whether the exception was triggered by a MVPG
> - * instruction, or whether the addr field is meaningful
> - */
> - unsigned long m:1;
> - unsigned long asce_id:2;
> + union {
> + /* common fields DAT exc & protection exc */
> + struct {
> + uint64_t addr : 52 - 0;
> + uint64_t acc_exc_f_s : 54 - 52;
> + uint64_t side_effect_acc : 55 - 54;
> + uint64_t /* reserved */ : 55 - 54;
shouldn't this ^ be 62 - 55 ?
> + uint64_t asce_id : 64 - 62;
> + };
> + /* DAT exc */
> + struct {
> + uint64_t /* pad */ : 61 - 0;
> + uint64_t dat_move_page : 62 - 61;
> + };
> + /* suppression on protection */
> + struct {
> + uint64_t /* pad */ : 60 - 0;
> + uint64_t sop_acc_list : 61 - 60;
> + uint64_t sop_teid_predictable : 62 - 61;
> + };
> + /* enhanced suppression on protection 1 */
> + struct {
> + uint64_t /* pad */ : 61 - 0;
60 - 0
> + uint64_t esop1_acc_list_or_dat : 62 - 61;
61 - 60
and then:
uint64_t esop1_teid_predictable : 62 - 61;
> + };
> + /* enhanced suppression on protection 2 */
> + struct {
> + uint64_t /* pad */ : 56 - 0;
> + uint64_t esop2_prot_code_0 : 57 - 56;
> + uint64_t /* pad */ : 60 - 57;
> + uint64_t esop2_prot_code_1 : 61 - 60;
> + uint64_t esop2_prot_code_2 : 62 - 61;
> + };
> };
> };
>
> +enum prot_code {
> + PROT_KEY_LAP,
> + PROT_DAT,
> + PROT_KEY,
> + PROT_ACC_LIST,
> + PROT_LAP,
> + PROT_IEP,
I would still also define two PROT_INVALID or PROT_RESERVED
just to avoid surprises
> +};
> +
> +static inline enum prot_code teid_esop2_prot_code(union teid teid)
> +{
> + int code = 0;
> +
> + code = code << 1 | teid.esop2_prot_code_0;
> + code = code << 1 | teid.esop2_prot_code_1;
> + code = code << 1 | teid.esop2_prot_code_2;
> + return (enum prot_code)code;
return (enum prot_code)(teid.esop2_prot_code_0 << 2 |
teid.esop2_prot_code_1 << 1 |
teid.esop2_prot_code_2);
> +}
> +
> void register_pgm_cleanup_func(void (*f)(void));
> void handle_pgm_int(struct stack_frame_int *stack);
> void handle_ext_int(struct stack_frame_int *stack);
> diff --git a/lib/s390x/fault.h b/lib/s390x/fault.h
> index 726da2f0..867997f2 100644
> --- a/lib/s390x/fault.h
> +++ b/lib/s390x/fault.h
> @@ -11,32 +11,16 @@
> #define _S390X_FAULT_H_
>
> #include <bitops.h>
> +#include <asm/facility.h>
> +#include <asm/interrupt.h>
>
> /* Instruction execution prevention, i.e. no-execute, 101 */
> -static inline bool prot_is_iep(uint64_t teid)
> +static inline bool prot_is_iep(union teid teid)
> {
> - if (test_bit_inv(56, &teid) && !test_bit_inv(60, &teid) && test_bit_inv(61, &teid))
> - return true;
> -
> - return false;
> -}
> -
> -/* Standard DAT exception, 001 */
> -static inline bool prot_is_datp(uint64_t teid)
> -{
> - if (!test_bit_inv(56, &teid) && !test_bit_inv(60, &teid) && test_bit_inv(61, &teid))
> - return true;
> -
> - return false;
> -}
> -
> -/* Low-address protection exception, 100 */
> -static inline bool prot_is_lap(uint64_t teid)
> -{
> - if (test_bit_inv(56, &teid) && !test_bit_inv(60, &teid) && !test_bit_inv(61, &teid))
> - return true;
> -
> - return false;
> + if (!test_facility(130))
> + return false;
> + /* IEP installed -> ESOP2 installed */
> + return teid_esop2_prot_code(teid) == PROT_IEP;
> }
>
> void print_decode_teid(uint64_t teid);
> diff --git a/lib/s390x/fault.c b/lib/s390x/fault.c
> index efa62fcb..02b3c098 100644
> --- a/lib/s390x/fault.c
> +++ b/lib/s390x/fault.c
> @@ -13,35 +13,63 @@
> #include <asm/page.h>
> #include <fault.h>
>
> -/* Decodes the protection exceptions we'll most likely see */
> -static void print_decode_pgm_prot(uint64_t teid)
> -{
> - if (prot_is_lap(teid)) {
> - printf("Type: LAP\n");
> - return;
> - }
> -
> - if (prot_is_iep(teid)) {
> - printf("Type: IEP\n");
> - return;
> - }
>
> - if (prot_is_datp(teid)) {
> - printf("Type: DAT\n");
> - return;
> +static void print_decode_pgm_prot(union teid teid, bool dat)
> +{
> + switch (get_supp_on_prot_facility()) {
> + case SOP_NONE:
> + printf("Type: ?\n");
> + break;
> + case SOP_BASIC:
> + if (teid.sop_teid_predictable && dat && teid.sop_acc_list)
> + printf("Type: ACC\n");
> + else
> + printf("Type: ?\n");
> + break;
> + case SOP_ENHANCED_1:
> + if (teid.esop1_acc_list_or_dat) {
> + if (teid.sop_acc_list)
> + printf("Type: ACC\n");
> + else
> + printf("Type: DAT\n");
> + } else {
> + printf("Type: KEY or LAP\n");
> + }
> + break;
> + case SOP_ENHANCED_2:
> + switch (teid_esop2_prot_code(teid)) {
I wonder if it weren't easier to do
static const char * const prot_strings[6] = {"KEY or LAP", "DAT", ...};
printf("Type: %s\n", prot_strings[teid_esop2_prot_code(teid)]);
> + case PROT_KEY_LAP:
> + printf("Type: KEY or LAP\n");
> + break;
> + case PROT_DAT:
> + printf("Type: DAT\n");
> + break;
> + case PROT_KEY:
> + printf("Type: KEY\n");
> + break;
> + case PROT_ACC_LIST:
> + printf("Type: ACC\n");
> + break;
> + case PROT_LAP:
> + printf("Type: LAP\n");
> + break;
> + case PROT_IEP:
> + printf("Type: IEP\n");
> + break;
> + }
> }
> }
>
> -void print_decode_teid(uint64_t teid)
> +void print_decode_teid(uint64_t raw_teid)
> {
> - int asce_id = teid & 3;
> + union teid teid = { .val = raw_teid };
> bool dat = lowcore.pgm_old_psw.mask & PSW_MASK_DAT;
>
> printf("Memory exception information:\n");
> printf("DAT: %s\n", dat ? "on" : "off");
>
> printf("AS: ");
> - switch (asce_id) {
> + switch (teid.asce_id) {
> case AS_PRIM:
> printf("Primary\n");
> break;
> @@ -57,7 +85,7 @@ void print_decode_teid(uint64_t teid)
> }
>
> if (lowcore.pgm_int_code == PGM_INT_CODE_PROTECTION)
> - print_decode_pgm_prot(teid);
> + print_decode_pgm_prot(teid, dat);
>
> /*
> * If teid bit 61 is off for these two exception the reported
> @@ -65,10 +93,10 @@ void print_decode_teid(uint64_t teid)
> */
> if ((lowcore.pgm_int_code == PGM_INT_CODE_SECURE_STOR_ACCESS ||
> lowcore.pgm_int_code == PGM_INT_CODE_SECURE_STOR_VIOLATION) &&
> - !test_bit_inv(61, &teid)) {
> - printf("Address: %lx, unpredictable\n ", teid & PAGE_MASK);
> + !teid.sop_teid_predictable) {
> + printf("Address: %lx, unpredictable\n ", raw_teid & PAGE_MASK);
> return;
> }
> - printf("TEID: %lx\n", teid);
> - printf("Address: %lx\n\n", teid & PAGE_MASK);
> + printf("TEID: %lx\n", raw_teid);
> + printf("Address: %lx\n\n", raw_teid & PAGE_MASK);
teid.addr << PAGE_SHIFT ?
> }
> diff --git a/lib/s390x/interrupt.c b/lib/s390x/interrupt.c
> index 6da20c44..ac3d1ecd 100644
> --- a/lib/s390x/interrupt.c
> +++ b/lib/s390x/interrupt.c
> @@ -77,7 +77,7 @@ static void fixup_pgm_int(struct stack_frame_int *stack)
> break;
> case PGM_INT_CODE_PROTECTION:
> /* Handling for iep.c test case. */
> - if (prot_is_iep(lowcore.trans_exc_id))
> + if (prot_is_iep((union teid) { .val = lowcore.trans_exc_id }))
> /*
> * We branched to the instruction that caused
> * the exception so we can use the return
> diff --git a/s390x/edat.c b/s390x/edat.c
> index c6c25042..af442039 100644
> --- a/s390x/edat.c
> +++ b/s390x/edat.c
> @@ -37,14 +37,20 @@ static bool check_pgm_prot(void *ptr)
> return false;
>
> teid.val = lowcore.trans_exc_id;
> -
> - /*
> - * depending on the presence of the ESOP feature, the rest of the
> - * field might or might not be meaningful when the m field is 0.
> - */
> - if (!teid.m)
> + switch (get_supp_on_prot_facility()) {
> + case SOP_NONE:
> return true;
> - return (!teid.acc_list_prot && !teid.asce_id &&
> + case SOP_BASIC:
> + if (!teid.sop_teid_predictable)
> + return true;
add:
if (teid.sop_acc_list)
return false;
> + case SOP_ENHANCED_1:
you need to handle the unpredictable case here too
> + if (!teid.esop1_acc_list_or_dat)
> + return false;
so you return false the it is DAT... but if it is not DAT, it's
access-control-list...
you might want to replace this whole case with:
return !teid.esop1_teid_predictable;
(although I don't understand why you want to exclude DAT here)
> + case SOP_ENHANCED_2:
> + if (teid_esop2_prot_code(teid) != 1)
why not using the PROT_DAT enum?
also, handle the PROT_ACC_LIST too
also, add:
if (PROT_KEY_LAP)
return true;
because in that case you don't have the address part.
but at this point I wonder if you can't just rewrite this function with
an additional enum prot_code parameter, to specify the exact type of
exception you're expecting
> + return false;
> + }
> + return (!teid.sop_acc_list && !teid.asce_id &&
> (teid.addr == ((unsigned long)ptr >> PAGE_SHIFT)));
> }
>
next prev parent reply other threads:[~2022-05-24 14:40 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-05-20 19:08 [kvm-unit-tests PATCH 0/3] s390x: Rework TEID decoding and usage Janis Schoetterl-Glausch
2022-05-20 19:08 ` [kvm-unit-tests PATCH 1/3] s390x: Fix sclp facility bit numbers Janis Schoetterl-Glausch
2022-05-20 19:08 ` [kvm-unit-tests PATCH 2/3] s390x: lib: SOP facility query function Janis Schoetterl-Glausch
2022-05-24 12:49 ` Claudio Imbrenda
2022-05-20 19:08 ` [kvm-unit-tests PATCH 3/3] s390x: Rework TEID decoding and usage Janis Schoetterl-Glausch
2022-05-24 14:40 ` Claudio Imbrenda [this message]
2022-06-03 13:49 ` Janis Schoetterl-Glausch
2022-06-03 15:20 ` Claudio Imbrenda
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20220524164030.6adb45bf@p-imbrenda \
--to=imbrenda@linux.ibm.com \
--cc=david@redhat.com \
--cc=frankja@linux.ibm.com \
--cc=kvm@vger.kernel.org \
--cc=linux-s390@vger.kernel.org \
--cc=scgl@linux.ibm.com \
--cc=thuth@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox