public inbox for linux-s390@vger.kernel.org
 help / color / mirror / Atom feed
From: Michael Mueller <mimu@linux.ibm.com>
To: Christian Borntraeger <borntraeger@linux.ibm.com>,
	linux-s390@vger.kernel.org
Cc: frankja@linux.ibm.com, nrb@linux.ibm.com
Subject: Re: [PATCH] KVM: s390: fix validity interception issue when gisa is switched off
Date: Thu, 1 Aug 2024 14:28:48 +0200	[thread overview]
Message-ID: <d81729e3-3f58-406c-ad88-84686d6ce3d9@linux.ibm.com> (raw)
In-Reply-To: <a9413be8-1c8f-43a7-b60b-569750a620e7@linux.ibm.com>



On 31.07.24 14:24, Christian Borntraeger wrote:
> Am 31.07.24 um 13:31 schrieb Michael Mueller:
>> The following validity interception occures when the gisa usage has been
>> switched off either by using kernel parameter "kvm.use_gisa=0" or by
>> setting the related sysfs attribute to N (echo N >/sys/module/kvm/
>> parameters/use_gisa).
>>
>> The issue surfaces in the host kernel with the following kernel 
>> message as
>> soon a new kvm guest start has been attemted.
>>
>> kvm: unhandled validity intercept 0x1011
>> WARNING: CPU: 0 PID: 781237 at arch/s390/kvm/intercept.c:101 
>> kvm_handle_sie_intercept+0x42e/0x4d0 [kvm]
>> Modules linked in: vhost_net tap tun xt_CHECKSUM xt_MASQUERADE 
>> xt_conntrack ipt_REJECT xt_tcpudp nft_compat x_tables nf_nat_tftp 
>> nf_conntrack_tftp vfio_pci_core irqbypass vhost_vsock 
>> vmw_vsock_virtio_transport_common vsock vhost vhost_iotlb kvm 
>> nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet 
>> nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat 
>> nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables sunrpc 
>> mlx5_ib ib_uverbs ib_core mlx5_core uvdevice s390_trng eadm_sch 
>> vfio_ccw zcrypt_cex4 mdev vfio_iommu_type1 vfio sch_fq_codel drm 
>> i2c_core loop drm_panel_orientation_quirks configfs nfnetlink lcs ctcm 
>> fsm dm_service_time ghash_s390 prng chacha_s390 libchacha aes_s390 
>> des_s390 libdes sha3_512_s390 sha3_256_s390 sha512_s390 sha256_s390 
>> sha1_s390 sha_common dm_mirror dm_region_hash dm_log zfcp 
>> scsi_transport_fc scsi_dh_rdac scsi_dh_emc scsi_dh_alua pkey zcrypt 
>> dm_multipath rng_core autofs4 [last unloaded: vfio_pci]
>> CPU: 0 PID: 781237 Comm: CPU 0/KVM Not tainted 
>> 6.10.0-08682-gcad9f11498ea #6
>> Hardware name: IBM 3931 A01 701 (LPAR)
>> Krnl PSW : 0704c00180000000 000003d93deb0122 
>> (kvm_handle_sie_intercept+0x432/0x4d0 [kvm])
>>             R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3
>> Krnl GPRS: 000003d900000027 000003d900000023 0000000000000028 
>> 000002cd00000000
>>             000002d063a00900 00000359c6daf708 00000000000bebb5 
>> 0000000000001eff
>>             000002cfd82e9000 000002cfd80bc000 0000000000001011 
>> 000003d93deda412
>>             000003ff8962df98 000003d93de77ce0 000003d93deb011e 
>> 00000359c6daf960
>> Krnl Code: 000003d93deb0112: c020fffe7259    larl    %r2,000003d93de7e5c4
>>             000003d93deb0118: c0e53fa8beac    brasl    
>> %r14,000003d9bd3c7e70
>>            #000003d93deb011e: af000000        mc    0,0
>>            >000003d93deb0122: a728ffea        lhi    %r2,-22
>>             000003d93deb0126: a7f4fe24        brc    15,000003d93deafd6e
>>             000003d93deb012a: 9101f0b0        tm    176(%r15),1
>>             000003d93deb012e: a774fe48        brc    7,000003d93deafdbe
>>             000003d93deb0132: 40a0f0ae        sth    %r10,174(%r15)
>> Call Trace:
>>   [<000003d93deb0122>] kvm_handle_sie_intercept+0x432/0x4d0 [kvm]
>> ([<000003d93deb011e>] kvm_handle_sie_intercept+0x42e/0x4d0 [kvm])
>>   [<000003d93deacc10>] vcpu_post_run+0x1d0/0x3b0 [kvm]
>>   [<000003d93deaceda>] __vcpu_run+0xea/0x2d0 [kvm]
>>   [<000003d93dead9da>] kvm_arch_vcpu_ioctl_run+0x16a/0x430 [kvm]
>>   [<000003d93de93ee0>] kvm_vcpu_ioctl+0x190/0x7c0 [kvm]
>>   [<000003d9bd728b4e>] vfs_ioctl+0x2e/0x70
>>   [<000003d9bd72a092>] __s390x_sys_ioctl+0xc2/0xd0
>>   [<000003d9be0e9222>] __do_syscall+0x1f2/0x2e0
>>   [<000003d9be0f9a90>] system_call+0x70/0x98
>> Last Breaking-Event-Address:
>>   [<000003d9bd3c7f58>] __warn_printk+0xe8/0xf0
>>
>> Cc: stable@vger.kernel.org
>> Reported-by: Christian Borntraeger <borntraeger@linux.ibm.com>
>> Closes: 
>> https://ibm-systems-z.slack.com/archives/C04BWBXSKEY/p1722280755665409
>> Fixes: fe0ef0030463 ("KVM: s390: sort out physical vs virtual pointers 
>> usage")
>> Signed-off-by: Michael Mueller <mimu@linux.ibm.com>
> 
> Tested-by: Christian Borntraeger <borntraeger@linux.ibm.com>
> 

Thanks.

  reply	other threads:[~2024-08-01 12:28 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-07-31 11:31 [PATCH] KVM: s390: fix validity interception issue when gisa is switched off Michael Mueller
2024-07-31 12:05 ` Janosch Frank
2024-08-01 12:27   ` Michael Mueller
2024-07-31 12:24 ` Christian Borntraeger
2024-08-01 12:28   ` Michael Mueller [this message]
  -- strict thread matches above, loose matches on Subject: below --
2024-07-31 11:29 Michael Mueller
2024-07-30 14:25 Michael Mueller

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=d81729e3-3f58-406c-ad88-84686d6ce3d9@linux.ibm.com \
    --to=mimu@linux.ibm.com \
    --cc=borntraeger@linux.ibm.com \
    --cc=frankja@linux.ibm.com \
    --cc=linux-s390@vger.kernel.org \
    --cc=nrb@linux.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox