Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp3116649imj; Mon, 18 Feb 2019 20:21:06 -0800 (PST) X-Google-Smtp-Source: AHgI3IYLPGW9bKnkMeh/NtWfywme/1z0shBbRWm/QDa4+9fUClTSkAR2uPhDLS4BwivLXL0+bQC5 X-Received: by 2002:a17:902:7c98:: with SMTP id y24mr10987755pll.191.1550550066058; Mon, 18 Feb 2019 20:21:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550550066; cv=none; d=google.com; s=arc-20160816; b=Yh+sY0DVJRpq1EHcHOFUwc0raP0Wi7KFziD0CUK7z/DUn74zPxzwkDQgU5Gr7+jYSO Ivy6PU8LfqjhK5vI7wW0a1Zb3yWHjkVUU03Wj+A3P4Cp19kUfnkiUEUJ5s++AOqhV6RV Us/d8yyQa8zlqzFjEFe9+1vnHEq84T2NAaBtmBJV7fGOLXnCN3ms+YB5gqrPxu9VCVLu Z+SZAnoAo2YdlSYlul3GCBtYnncFMJQcCr5swAb3JA/dgLe7zONuas2LLhSF8V1zyt83 jqx/rcKLRM/l3CfXkTPytjr99WTC0chln6sPsNbP/fCBr1uXBlrCFTDrZygbJviz2GsO Ujww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:references:in-reply-to:subject:to:from; bh=QheR0tHEvfI8g8eGMGpmqUjuewoKvZdLWyff15HHWxQ=; b=dMRc/Bwm+xZcbzIi6/2RURR0gvXZ9O+DoNnPu19VUWDwPZEjWRoQJO7f+qyDgaVh+U jO8YvSflrP5plUxaSuD80IUtj+4YuRXEAeTW/ykRkrSqV4eup2kYQSVEAk2owhWEcqK1 kR2LmnTGL9lvLiW/wxWCkLUV2DRhv2Z+tNIvhSXobh5ZlEkatIjiA5LyA0rdTYcHg1dY kFIkqhwke6iC5ZcJishxayoOA9qshoXiH4Uzq8VgTXNeA3l062NDo5NVpIA5lOb61j5v f15SwOMNfTXj5sOOYBR0dv/1P11B8ote7xhZOPMmQa/EJ4Bmaim5Nujatld+hzB/WwY9 3cig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l192si10666615pge.280.2019.02.18.20.20.50; Mon, 18 Feb 2019 20:21:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726149AbfBSEU1 convert rfc822-to-8bit (ORCPT + 99 others); Mon, 18 Feb 2019 23:20:27 -0500 Received: from ozlabs.org ([203.11.71.1]:38677 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725770AbfBSEU1 (ORCPT ); Mon, 18 Feb 2019 23:20:27 -0500 Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPSA id 443SFh3vWsz9s5c; Tue, 19 Feb 2019 15:20:23 +1100 (AEDT) From: Michael Ellerman To: Mark Cave-Ayland , Christophe Leroy , benh@kernel.crashing.org, paulus@samba.org, npiggin@gmail.com, linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org, kvm-ppc@vger.kernel.org Subject: Re: [PATCH] powerpc: fix 32-bit KVM-PR lockup and panic with MacOS guest In-Reply-To: <2ed8efb9-5cd4-31bf-6c7b-501b9d1925e6@ilande.co.uk> References: <20190208143319.11980-1-mark.cave-ayland@ilande.co.uk> <41b02fb0-cdc6-6de0-d8fc-44d3d0a8ad70@c-s.fr> <2ed8efb9-5cd4-31bf-6c7b-501b9d1925e6@ilande.co.uk> Date: Tue, 19 Feb 2019 15:20:21 +1100 Message-ID: <87pnrobe9m.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Mark Cave-Ayland writes: > On 08/02/2019 14:45, Christophe Leroy wrote: > >> Le 08/02/2019 à 15:33, Mark Cave-Ayland a écrit : >>> Commit 8792468da5e1 "powerpc: Add the ability to save FPU without giving it up" >> >> Expected format for the above is: >> >> Commit 123456789abc ("text") > > Hi Christophe, > > Apologies - I'm fairly new at submitting kernel patches, but I can re-send it in the > correct format later if required. > >>> unexpectedly removed the MSR_FE0 and MSR_FE1 bits from the bitmask used to >>> update the MSR of the previous thread in __giveup_fpu() causing a KVM-PR MacOS >>> guest to lockup and panic the kernel. Which kernel is panicking? The guest or the host? >>> Reinstate these bits to the MSR bitmask to enable MacOS guests to run under >>> 32-bit KVM-PR once again without issue. >>> >>> Signed-off-by: Mark Cave-Ayland >> >> Should include a Fixes: and a Cc to stable ? >> >> Fixes: 8792468da5e1 ("powerpc: Add the ability to save FPU without giving it up") >> Cc: stable@vger.kernel.org > > Indeed, but there are still some questions to be asked here: > > 1) Why were these bits removed from the original bitmask in the first place without > it being documented in the commit message? It was almost certainly an accident. > 2) Is this the right fix? I'm told that MacOS guests already run without this patch > on a G5 under 64-bit KVM-PR which may suggest that this is a workaround for another > bug elsewhere in the 32-bit powerpc code. That's slightly worrying. It's hard to say without more detail on why the guest is crashing. I think your patch looks OK based just on the fact that it restores the previous behaviour, so I'll pick it up and pass it through my usual testing. If nothing breaks I'll merge it. cheers