Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1911976imm; Thu, 23 Aug 2018 10:47:35 -0700 (PDT) X-Google-Smtp-Source: AA+uWPw/bxHdGlsZ8E8OR+AVCzBAYJ6hcoYQt+0Dr11DGVDvZ4zuQ6O7kShLtTqEoWKlTBW1MzFR X-Received: by 2002:a17:902:bf41:: with SMTP id u1-v6mr20191962pls.222.1535046455251; Thu, 23 Aug 2018 10:47:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535046455; cv=none; d=google.com; s=arc-20160816; b=Snqc9xrRZL1RF4ZRFkJOe6EbSsX23AtedexNW7iud81TYosI7mCsYnvGoTUAjKREJc bs9lmVBLP6Z8yq7Gmu24ommGY+5I9uGA2FbUcPjojM92X37zNmlZlmXIzIAA0TDGs2Jo uqiVeDaAvdIBqYYT1CyIZuW6MIz+9FUOBARRPd1byUMo4JdUpxlgoOPasWQ2FyZLXhOl sptrkU73c9ywzIeCY5OYJ3c85tInEMQf6tcM6eMRb8lFOqxOhwbTbwXRan2Fkon1XGLN N86dsGVIaoIJIwwAJqIO41SQWx2sygdv8vGTkwe+SFtVFLBuMiZd04IEBdXt74Nj3r2E MnIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:organization:autocrypt:openpgp:from:references:cc:to :subject:arc-authentication-results; bh=aiiRfUXT7o/zRG3B4QygrvDV66FN6VoikgLJoS+uDxc=; b=MnW+K5lQkgp+WyPcp9OLyF58U/lJ98zW30jjO2sgAxTZohrRlAMP5zB50nqRTPIR5A AvIIsIckqEjt0obOJdXJn48G5CgCRGTB6Tm9ucCLmag5oNN7eQCh+S+M6oPKr9uQxpkU RhZfLw6VDYD7rNbwIxrX5MmTzgNdz0gfLi73OIyI7ttviDxR2xGNNdLggDvN9v0Pjfgf kSoJgkOaet/nnz8llm3GwtgCzUsyHH1OR+NlIZlXc/ohyS2ryMpws1H2oiOBphjaQO0U kS2EHxf/WFMm/K7YYROpA8UGFZ0+b6mXgV8s7e5Zxfnyw6XOS03nW8/rOu41pppn1THm IKig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d35-v6si4650068pla.116.2018.08.23.10.47.19; Thu, 23 Aug 2018 10:47:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727333AbeHWVPL (ORCPT + 99 others); Thu, 23 Aug 2018 17:15:11 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:36952 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726461AbeHWVPL (ORCPT ); Thu, 23 Aug 2018 17:15:11 -0400 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id DFC6340241C5; Thu, 23 Aug 2018 17:44:22 +0000 (UTC) Received: from [10.36.116.73] (ovpn-116-73.ams2.redhat.com [10.36.116.73]) by smtp.corp.redhat.com (Postfix) with ESMTP id 59D332156701; Thu, 23 Aug 2018 17:44:21 +0000 (UTC) Subject: Re: [PATCH v1] KVM: s390: store DXC/VXC in fpc on DATA/Vector-processing exceptions To: Christian Borntraeger , linux-kernel@vger.kernel.org Cc: linux-s390@vger.kernel.org, Heiko Carstens , Martin Schwidefsky , Cornelia Huck , Janosch Frank , Hendrik Brueckner References: <20180822095310.29145-1-david@redhat.com> <7c7e52aa-7b07-d146-ac4e-2b1afea6a83d@de.ibm.com> From: David Hildenbrand Openpgp: preference=signencrypt Autocrypt: addr=david@redhat.com; prefer-encrypt=mutual; keydata= xsFNBFXLn5EBEAC+zYvAFJxCBY9Tr1xZgcESmxVNI/0ffzE/ZQOiHJl6mGkmA1R7/uUpiCjJ dBrn+lhhOYjjNefFQou6478faXE6o2AhmebqT4KiQoUQFV4R7y1KMEKoSyy8hQaK1umALTdL QZLQMzNE74ap+GDK0wnacPQFpcG1AE9RMq3aeErY5tujekBS32jfC/7AnH7I0v1v1TbbK3Gp XNeiN4QroO+5qaSr0ID2sz5jtBLRb15RMre27E1ImpaIv2Jw8NJgW0k/D1RyKCwaTsgRdwuK Kx/Y91XuSBdz0uOyU/S8kM1+ag0wvsGlpBVxRR/xw/E8M7TEwuCZQArqqTCmkG6HGcXFT0V9 PXFNNgV5jXMQRwU0O/ztJIQqsE5LsUomE//bLwzj9IVsaQpKDqW6TAPjcdBDPLHvriq7kGjt WhVhdl0qEYB8lkBEU7V2Yb+SYhmhpDrti9Fq1EsmhiHSkxJcGREoMK/63r9WLZYI3+4W2rAc UucZa4OT27U5ZISjNg3Ev0rxU5UH2/pT4wJCfxwocmqaRr6UYmrtZmND89X0KigoFD/XSeVv jwBRNjPAubK9/k5NoRrYqztM9W6sJqrH8+UWZ1Idd/DdmogJh0gNC0+N42Za9yBRURfIdKSb B3JfpUqcWwE7vUaYrHG1nw54pLUoPG6sAA7Mehl3nd4pZUALHwARAQABzSREYXZpZCBIaWxk ZW5icmFuZCA8ZGF2aWRAcmVkaGF0LmNvbT7CwX4EEwECACgFAljj9eoCGwMFCQlmAYAGCwkI BwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEE3eEPcA/4Na5IIP/3T/FIQMxIfNzZshIq687qgG 8UbspuE/YSUDdv7r5szYTK6KPTlqN8NAcSfheywbuYD9A4ZeSBWD3/NAVUdrCaRP2IvFyELj xoMvfJccbq45BxzgEspg/bVahNbyuBpLBVjVWwRtFCUEXkyazksSv8pdTMAs9IucChvFmmq3 jJ2vlaz9lYt/lxN246fIVceckPMiUveimngvXZw21VOAhfQ+/sofXF8JCFv2mFcBDoa7eYob s0FLpmqFaeNRHAlzMWgSsP80qx5nWWEvRLdKWi533N2vC/EyunN3HcBwVrXH4hxRBMco3jvM m8VKLKao9wKj82qSivUnkPIwsAGNPdFoPbgghCQiBjBe6A75Z2xHFrzo7t1jg7nQfIyNC7ez MZBJ59sqA9EDMEJPlLNIeJmqslXPjmMFnE7Mby/+335WJYDulsRybN+W5rLT5aMvhC6x6POK z55fMNKrMASCzBJum2Fwjf/VnuGRYkhKCqqZ8gJ3OvmR50tInDV2jZ1DQgc3i550T5JDpToh dPBxZocIhzg+MBSRDXcJmHOx/7nQm3iQ6iLuwmXsRC6f5FbFefk9EjuTKcLMvBsEx+2DEx0E UnmJ4hVg7u1PQ+2Oy+Lh/opK/BDiqlQ8Pz2jiXv5xkECvr/3Sv59hlOCZMOaiLTTjtOIU7Tq 7ut6OL64oAq+zsFNBFXLn5EBEADn1959INH2cwYJv0tsxf5MUCghCj/CA/lc/LMthqQ773ga uB9mN+F1rE9cyyXb6jyOGn+GUjMbnq1o121Vm0+neKHUCBtHyseBfDXHA6m4B3mUTWo13nid 0e4AM71r0DS8+KYh6zvweLX/LL5kQS9GQeT+QNroXcC1NzWbitts6TZ+IrPOwT1hfB4WNC+X 2n4AzDqp3+ILiVST2DT4VBc11Gz6jijpC/KI5Al8ZDhRwG47LUiuQmt3yqrmN63V9wzaPhC+ xbwIsNZlLUvuRnmBPkTJwwrFRZvwu5GPHNndBjVpAfaSTOfppyKBTccu2AXJXWAE1Xjh6GOC 8mlFjZwLxWFqdPHR1n2aPVgoiTLk34LR/bXO+e0GpzFXT7enwyvFFFyAS0Nk1q/7EChPcbRb hJqEBpRNZemxmg55zC3GLvgLKd5A09MOM2BrMea+l0FUR+PuTenh2YmnmLRTro6eZ/qYwWkC u8FFIw4pT0OUDMyLgi+GI1aMpVogTZJ70FgV0pUAlpmrzk/bLbRkF3TwgucpyPtcpmQtTkWS gDS50QG9DR/1As3LLLcNkwJBZzBG6PWbvcOyrwMQUF1nl4SSPV0LLH63+BrrHasfJzxKXzqg rW28CTAE2x8qi7e/6M/+XXhrsMYG+uaViM7n2je3qKe7ofum3s4vq7oFCPsOgwARAQABwsFl BBgBAgAPBQJVy5+RAhsMBQkJZgGAAAoJEE3eEPcA/4NagOsP/jPoIBb/iXVbM+fmSHOjEshl KMwEl/m5iLj3iHnHPVLBUWrXPdS7iQijJA/VLxjnFknhaS60hkUNWexDMxVVP/6lbOrs4bDZ NEWDMktAeqJaFtxackPszlcpRVkAs6Msn9tu8hlvB517pyUgvuD7ZS9gGOMmYwFQDyytpepo YApVV00P0u3AaE0Cj/o71STqGJKZxcVhPaZ+LR+UCBZOyKfEyq+ZN311VpOJZ1IvTExf+S/5 lqnciDtbO3I4Wq0ArLX1gs1q1XlXLaVaA3yVqeC8E7kOchDNinD3hJS4OX0e1gdsx/e6COvy qNg5aL5n0Kl4fcVqM0LdIhsubVs4eiNCa5XMSYpXmVi3HAuFyg9dN+x8thSwI836FoMASwOl C7tHsTjnSGufB+D7F7ZBT61BffNBBIm1KdMxcxqLUVXpBQHHlGkbwI+3Ye+nE6HmZH7IwLwV W+Ajl7oYF+jeKaH4DZFtgLYGLtZ1LDwKPjX7VAsa4Yx7S5+EBAaZGxK510MjIx6SGrZWBrrV TEvdV00F2MnQoeXKzD7O4WFbL55hhyGgfWTHwZ457iN9SgYi1JLPqWkZB0JRXIEtjd4JEQcx +8Umfre0Xt4713VxMygW0PnQt5aSQdMD58jHFxTk092mU+yIHj5LeYgvwSgZN4airXk5yRXl SE+xAvmumFBY Organization: Red Hat GmbH Message-ID: Date: Thu, 23 Aug 2018 19:44:20 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <7c7e52aa-7b07-d146-ac4e-2b1afea6a83d@de.ibm.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Thu, 23 Aug 2018 17:44:22 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Thu, 23 Aug 2018 17:44:22 +0000 (UTC) for IP:'10.11.54.6' DOMAIN:'int-mx06.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'david@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 23.08.2018 17:43, Christian Borntraeger wrote: > > > On 08/22/2018 11:53 AM, David Hildenbrand wrote: >> When DATA exceptions and vector-processing exceptions (program interrupts) >> are injected, the DXC/VXC is also to be stored in the fpc, if AFP is >> enabled in CR0. >> >> This can happen inside KVM when reinjecting an interrupt during program >> interrupt intercepts. These are triggered for example when debugging the >> guest (concurrent PER events result in an intercept instead of an >> injection of such interrupts). >> >> Signed-off-by: David Hildenbrand >> --- >> >> Only compile-tested. > > I checked the Linux code (arch/s390/kernel/traps.c) and Linux uses the FPC (and > not the lowcore field) to decide about the signal (SIGFPE) and si_code. So we want > to have the correct DXC/VXC value. > > Now, I wrote a short test program that does > feenableexcept(FE_DIVBYZERO); > and a division by zero. > and attached gdb to that guest together with a breakpoint on the divide (and the instruction > after). > I get the pint exit for the instruction after (as it is suppressing) and at this point in > time the guest fpc already contains the correct DXC value. So you patch will certainly not > hurt, but it seems not necessary. Thanks for trying. Wonder if that is documented behavior or just works by pure luck. E.g. it would be interesting to see what other instructions do that usually don't touch the DXC, except when injecting an exception. E.g. CRT. But if you believe this is not needed, we can also drop it. (if ever somebody would want to inject from QEMU, he could also just set the fpc directly) > > Still trying to look further if I missed something. > >> >> arch/s390/include/asm/ctl_reg.h | 1 + >> arch/s390/kvm/interrupt.c | 8 ++++++++ >> 2 files changed, 9 insertions(+) >> >> diff --git a/arch/s390/include/asm/ctl_reg.h b/arch/s390/include/asm/ctl_reg.h >> index 4600453536c2..88f3f14baee9 100644 >> --- a/arch/s390/include/asm/ctl_reg.h >> +++ b/arch/s390/include/asm/ctl_reg.h >> @@ -11,6 +11,7 @@ >> #include >> >> #define CR0_CLOCK_COMPARATOR_SIGN _BITUL(63 - 10) >> +#define CR0_AFP_REGISTER_CONTROL _BITUL(63 - 45) >> #define CR0_EMERGENCY_SIGNAL_SUBMASK _BITUL(63 - 49) >> #define CR0_EXTERNAL_CALL_SUBMASK _BITUL(63 - 50) >> #define CR0_CLOCK_COMPARATOR_SUBMASK _BITUL(63 - 52) >> diff --git a/arch/s390/kvm/interrupt.c b/arch/s390/kvm/interrupt.c >> index fcb55b02990e..5b5754d8f460 100644 >> --- a/arch/s390/kvm/interrupt.c >> +++ b/arch/s390/kvm/interrupt.c >> @@ -765,6 +765,14 @@ static int __must_check __deliver_prog(struct kvm_vcpu *vcpu) >> break; >> case PGM_VECTOR_PROCESSING: >> case PGM_DATA: >> + if (vcpu->arch.sie_block->gcr[0] & CR0_AFP_REGISTER_CONTROL) { >> + /* make sure the new fpc will be lazily loaded */ >> + save_fpu_regs(); >> + /* the DXC/VXC cannot make the fpc invalid */ >> + current->thread.fpu.fpc &= ~0xff00u; >> + current->thread.fpu.fpc |= (pgm_info.data_exc_code << 8) >> + & 0xff00u; > > maybe reuse FPC_DXC_MASK instead of 0xff00 ? > Sure, didn't know about that. -- Thanks, David / dhildenb