public inbox for linux-s390@vger.kernel.org
 help / color / mirror / Atom feed
From: Claudio Imbrenda <imbrenda@linux.ibm.com>
To: Nico Boehr <nrb@linux.ibm.com>
Cc: frankja@linux.ibm.com, thuth@redhat.com, kvm@vger.kernel.org,
	linux-s390@vger.kernel.org
Subject: Re: [kvm-unit-tests PATCH v7 3/8] s390x: sie: switch to home space mode before entering SIE
Date: Fri, 3 Nov 2023 14:44:24 +0100	[thread overview]
Message-ID: <20231103144424.139994a5@p-imbrenda> (raw)
In-Reply-To: <20231103092954.238491-4-nrb@linux.ibm.com>

On Fri,  3 Nov 2023 10:29:32 +0100
Nico Boehr <nrb@linux.ibm.com> wrote:

> This is to prepare for running guests without MSO/MSL, which is
> currently not possible.
> 
> We already have code in sie64a to setup a guest primary ASCE before
> entering SIE, so we can in theory switch to the page tables which
> translate gpa to hpa.
> 
> But the host is running in primary space mode already, so changing the
> primary ASCE before entering SIE will also affect the host's code and
> data.
> 
> To make this switch useful, the host should run in a different address
> space mode. Hence, set up and change to home address space mode before
> installing the guest ASCE.
> 
> The home space ASCE is just copied over from the primary space ASCE, so
> no functional change is intended, also for tests that want to use
> MSO/MSL. If a test intends to use a different primary space ASCE, it can
> now just set the guest.asce in the save_area.
> 
> Signed-off-by: Nico Boehr <nrb@linux.ibm.com>
> Reviewed-by: Thomas Huth <thuth@redhat.com>

Reviewed-by: Claudio Imbrenda <imbrenda@linux.ibm.com>

> ---
>  lib/s390x/asm/arch_def.h |  1 +
>  lib/s390x/sie.c          | 26 ++++++++++++++++++++++++++
>  2 files changed, 27 insertions(+)
> 
> diff --git a/lib/s390x/asm/arch_def.h b/lib/s390x/asm/arch_def.h
> index 5beaf15b57e7..745a33878de5 100644
> --- a/lib/s390x/asm/arch_def.h
> +++ b/lib/s390x/asm/arch_def.h
> @@ -92,6 +92,7 @@ enum address_space {
>  };
>  
>  #define PSW_MASK_DAT			0x0400000000000000UL
> +#define PSW_MASK_HOME			0x0000C00000000000UL
>  #define PSW_MASK_IO			0x0200000000000000UL
>  #define PSW_MASK_EXT			0x0100000000000000UL
>  #define PSW_MASK_KEY			0x00F0000000000000UL
> diff --git a/lib/s390x/sie.c b/lib/s390x/sie.c
> index b44febdeaaac..7f4474555ff7 100644
> --- a/lib/s390x/sie.c
> +++ b/lib/s390x/sie.c
> @@ -52,6 +52,8 @@ void sie_handle_validity(struct vm *vm)
>  
>  void sie(struct vm *vm)
>  {
> +	uint64_t old_cr13;
> +
>  	if (vm->sblk->sdf == 2)
>  		memcpy(vm->sblk->pv_grregs, vm->save_area.guest.grs,
>  		       sizeof(vm->save_area.guest.grs));
> @@ -59,6 +61,24 @@ void sie(struct vm *vm)
>  	/* Reset icptcode so we don't trip over it below */
>  	vm->sblk->icptcode = 0;
>  
> +	/*
> +	 * Set up home address space to match primary space. Instead of running
> +	 * in home space all the time, we switch every time in sie() because:
> +	 * - tests that depend on running in primary space mode don't need to be
> +	 *   touched
> +	 * - it avoids regressions in tests
> +	 * - switching every time makes it easier to extend this in the future,
> +	 *   for example to allow tests to run in whatever space they want
> +	 */
> +	old_cr13 = stctg(13);
> +	lctlg(13, stctg(1));
> +
> +	/* switch to home space so guest tables can be different from host */
> +	psw_mask_set_bits(PSW_MASK_HOME);
> +
> +	/* also handle all interruptions in home space while in SIE */
> +	irq_set_dat_mode(true, AS_HOME);
> +
>  	while (vm->sblk->icptcode == 0) {
>  		sie64a(vm->sblk, &vm->save_area);
>  		sie_handle_validity(vm);
> @@ -66,6 +86,12 @@ void sie(struct vm *vm)
>  	vm->save_area.guest.grs[14] = vm->sblk->gg14;
>  	vm->save_area.guest.grs[15] = vm->sblk->gg15;
>  
> +	irq_set_dat_mode(true, AS_PRIM);
> +	psw_mask_clear_bits(PSW_MASK_HOME);
> +
> +	/* restore the old CR 13 */
> +	lctlg(13, old_cr13);
> +
>  	if (vm->sblk->sdf == 2)
>  		memcpy(vm->save_area.guest.grs, vm->sblk->pv_grregs,
>  		       sizeof(vm->save_area.guest.grs));


  parent reply	other threads:[~2023-11-03 14:14 UTC|newest]

Thread overview: 25+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-11-03  9:29 [kvm-unit-tests PATCH v7 0/8] s390x: Add support for running guests without MSO/MSL Nico Boehr
2023-11-03  9:29 ` [kvm-unit-tests PATCH v7 1/8] lib: s390x: introduce bitfield for PSW mask Nico Boehr
2023-11-03 13:35   ` Claudio Imbrenda
2023-11-03 13:43   ` Janosch Frank
2023-11-03  9:29 ` [kvm-unit-tests PATCH v7 2/8] s390x: add function to set DAT mode for all interrupts Nico Boehr
2023-11-03 13:40   ` Claudio Imbrenda
2023-11-03  9:29 ` [kvm-unit-tests PATCH v7 3/8] s390x: sie: switch to home space mode before entering SIE Nico Boehr
2023-11-03 13:39   ` Janosch Frank
2023-11-03 13:44   ` Claudio Imbrenda [this message]
2023-11-03  9:29 ` [kvm-unit-tests PATCH v7 4/8] s390x: lib: don't forward PSW when handling exception in SIE Nico Boehr
2023-11-03  9:29 ` [kvm-unit-tests PATCH v7 5/8] s390x: lib: sie: don't reenter SIE on pgm int Nico Boehr
2023-11-03 13:48   ` Claudio Imbrenda
2023-11-03 13:53   ` Janosch Frank
2023-11-06 16:36     ` Nico Boehr
2023-11-03  9:29 ` [kvm-unit-tests PATCH v7 6/8] s390x: add test source dir to include paths Nico Boehr
2023-11-03 13:56   ` Janosch Frank
2023-11-03 13:57   ` Claudio Imbrenda
2023-11-03  9:29 ` [kvm-unit-tests PATCH v7 7/8] s390x: add a test for SIE without MSO/MSL Nico Boehr
2023-11-03 14:12   ` Claudio Imbrenda
2023-11-03 14:16   ` Janosch Frank
2023-11-06 15:51     ` Nico Boehr
2023-11-06 10:39   ` Heiko Carstens
2023-11-03  9:29 ` [kvm-unit-tests PATCH v7 8/8] lib: s390x: interrupt: remove TEID_ASCE defines Nico Boehr
2023-11-03 14:14   ` Claudio Imbrenda
2023-11-03 14:18   ` Janosch Frank

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20231103144424.139994a5@p-imbrenda \
    --to=imbrenda@linux.ibm.com \
    --cc=frankja@linux.ibm.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-s390@vger.kernel.org \
    --cc=nrb@linux.ibm.com \
    --cc=thuth@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox