public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: Heiko Carstens <hca@linux.ibm.com>
To: Nico Boehr <nrb@linux.ibm.com>
Cc: frankja@linux.ibm.com, imbrenda@linux.ibm.com, thuth@redhat.com,
	kvm@vger.kernel.org, linux-s390@vger.kernel.org
Subject: Re: [kvm-unit-tests PATCH v7 7/8] s390x: add a test for SIE without MSO/MSL
Date: Mon, 6 Nov 2023 11:39:11 +0100	[thread overview]
Message-ID: <20231106103911.12197-A-hca@linux.ibm.com> (raw)
In-Reply-To: <20231103092954.238491-8-nrb@linux.ibm.com>

On Fri, Nov 03, 2023 at 10:29:36AM +0100, Nico Boehr wrote:
> Since we now have the ability to run guests without MSO/MSL, add a test
> to make sure this doesn't break.
> 
> Signed-off-by: Nico Boehr <nrb@linux.ibm.com>
> Reviewed-by: Thomas Huth <thuth@redhat.com>
> ---
>  s390x/Makefile             |   2 +
>  s390x/sie-dat.c            | 110 +++++++++++++++++++++++++++++++++++++
>  s390x/snippets/c/sie-dat.c |  52 ++++++++++++++++++
>  s390x/snippets/c/sie-dat.h |   2 +
>  s390x/unittests.cfg        |   3 +
>  5 files changed, 169 insertions(+)
>  create mode 100644 s390x/sie-dat.c
>  create mode 100644 s390x/snippets/c/sie-dat.c
>  create mode 100644 s390x/snippets/c/sie-dat.h
...
> +static uint8_t test_page[GUEST_TEST_PAGE_COUNT * PAGE_SIZE] __attribute__((__aligned__(PAGE_SIZE)));
> +
> +static inline void force_exit(void)
> +{
> +	asm volatile("diag	0,0,0x44\n");
> +}
> +
> +static inline void force_exit_value(uint64_t val)
> +{
> +	asm volatile(
> +		"diag	%[val],0,0x9c\n"
> +		: : [val] "d"(val)
> +	);
> +}
> +
> +int main(void)
> +{
> +	uint8_t *invalid_ptr;
> +
> +	memset(test_page, 0, sizeof(test_page));
> +	/* tell the host the page's physical address (we're running DAT off) */
> +	force_exit_value((uint64_t)test_page);
> +
> +	/* write some value to the page so the host can verify it */
> +	for (size_t i = 0; i < GUEST_TEST_PAGE_COUNT; i++)
> +		test_page[i * PAGE_SIZE] = 42 + i;
> +
> +	/* indicate we've written all pages */
> +	force_exit();
> +
> +	/* the first unmapped address */
> +	invalid_ptr = (uint8_t *)(GUEST_TOTAL_PAGE_COUNT * PAGE_SIZE);
> +	*invalid_ptr = 42;
> +
> +	/* indicate we've written the non-allowed page (should never get here) */
> +	force_exit();
> +
> +	return 0;
> +}

The compiler will not necessarily generate the expected code here, since
there is no data dependency between the used inline assemblies and the
memory locations that are changed. That is: the compiler may move the
inline assemblies and/or memory assignments around.

In order to prevent that you could simply add a compiler barrier to both
inline assemblies (add "memory" to the clobber list).

  parent reply	other threads:[~2023-11-06 10:39 UTC|newest]

Thread overview: 25+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-11-03  9:29 [kvm-unit-tests PATCH v7 0/8] s390x: Add support for running guests without MSO/MSL Nico Boehr
2023-11-03  9:29 ` [kvm-unit-tests PATCH v7 1/8] lib: s390x: introduce bitfield for PSW mask Nico Boehr
2023-11-03 13:35   ` Claudio Imbrenda
2023-11-03 13:43   ` Janosch Frank
2023-11-03  9:29 ` [kvm-unit-tests PATCH v7 2/8] s390x: add function to set DAT mode for all interrupts Nico Boehr
2023-11-03 13:40   ` Claudio Imbrenda
2023-11-03  9:29 ` [kvm-unit-tests PATCH v7 3/8] s390x: sie: switch to home space mode before entering SIE Nico Boehr
2023-11-03 13:39   ` Janosch Frank
2023-11-03 13:44   ` Claudio Imbrenda
2023-11-03  9:29 ` [kvm-unit-tests PATCH v7 4/8] s390x: lib: don't forward PSW when handling exception in SIE Nico Boehr
2023-11-03  9:29 ` [kvm-unit-tests PATCH v7 5/8] s390x: lib: sie: don't reenter SIE on pgm int Nico Boehr
2023-11-03 13:48   ` Claudio Imbrenda
2023-11-03 13:53   ` Janosch Frank
2023-11-06 16:36     ` Nico Boehr
2023-11-03  9:29 ` [kvm-unit-tests PATCH v7 6/8] s390x: add test source dir to include paths Nico Boehr
2023-11-03 13:56   ` Janosch Frank
2023-11-03 13:57   ` Claudio Imbrenda
2023-11-03  9:29 ` [kvm-unit-tests PATCH v7 7/8] s390x: add a test for SIE without MSO/MSL Nico Boehr
2023-11-03 14:12   ` Claudio Imbrenda
2023-11-03 14:16   ` Janosch Frank
2023-11-06 15:51     ` Nico Boehr
2023-11-06 10:39   ` Heiko Carstens [this message]
2023-11-03  9:29 ` [kvm-unit-tests PATCH v7 8/8] lib: s390x: interrupt: remove TEID_ASCE defines Nico Boehr
2023-11-03 14:14   ` Claudio Imbrenda
2023-11-03 14:18   ` Janosch Frank

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20231106103911.12197-A-hca@linux.ibm.com \
    --to=hca@linux.ibm.com \
    --cc=frankja@linux.ibm.com \
    --cc=imbrenda@linux.ibm.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-s390@vger.kernel.org \
    --cc=nrb@linux.ibm.com \
    --cc=thuth@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox