[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH v2 07/13] s390x: protvirt: SCLP interpretation
From: |
David Hildenbrand |
Subject: |
Re: [PATCH v2 07/13] s390x: protvirt: SCLP interpretation |
Date: |
Fri, 29 Nov 2019 12:27:07 +0100 |
User-agent: |
Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.1.1 |
On 29.11.19 12:15, Janosch Frank wrote:
> On 11/29/19 11:43 AM, David Hildenbrand wrote:
>> On 29.11.19 10:48, Janosch Frank wrote:
>>> SCLP for a protected guest is done over the SIDAD, so we need to use
>>> the s390_cpu_virt_mem_* functions to access the SIDAD instead of guest
>>> memory when reading/writing SCBs.
>>
>> ... Can you elaborate a bit more how that is going to be used? Did you
>> hack in special memory access to something called "SIDAD" via
>> s390_cpu_virt_mem_*?
>
> For secure guests we can't ever access virtual guest memory, since we
> have no access to the guest translation tables.
>
> Hence we have the satellite block (SIDA) as a bounce buffer. SIE will
> bounce referenced blocks of data (like the SCCB) over the SIDA.
>
> The virt_mem functions go through the KVM mem op API. A KVM patch
> reroutes mem op access to the SIDA. The alternative would be to map the
> SIDA into vcpu_run.
>
I'd prefer *anything* over going via s390_cpu_virt_mem_*, because as
you say "For secure guests we can't ever access virtual guest memory".
Introduce a new interface or go via vcpu_run. IMHO that's much cleaner.
--
Thanks,
David / dhildenb
- [PATCH v2 00/13] s390x: Protected Virtualization support, Janosch Frank, 2019/11/29
- [PATCH v2 04/13] s390x: protvirt: Handle diag 308 subcodes 0,1,3,4, Janosch Frank, 2019/11/29
- [PATCH v2 05/13] s390x: protvirt: Add pv state to cpu env, Janosch Frank, 2019/11/29
- [PATCH v2 08/13] s390x: protvirt: Add new VCPU reset functions, Janosch Frank, 2019/11/29
[PATCH v2 12/13] s390x: protvirt: Disable address checks for PV guest IO emulation, Janosch Frank, 2019/11/29