Re: [PATCH 0/3] KVM: Make KVM_CHECK_EXTENSION a VM ioctl

2014-07-15 Thread Cornelia Huck
On Mon, 14 Jul 2014 19:03:35 +0200 Alexander Graf ag...@suse.de wrote: On PowerPC we have a small problem :). We can run both HV and PR style VMs on the same kvm fd. While this is great, it means that anything that's different between the two needs to have a token in form of a VM fd to find

[PATCH 1/6] kvm: ppc: booke: Enhance wrapper functions to handle shadow registers

2014-07-15 Thread Bharat Bhushan
There are shadow registers like, GSPRG[0-3], GSRR0, GSRR1 etc on BOOKE-HV and these shadow registers are guest accessible. So these shadow registers needs to be updated on BOOKE-HV. This patch enhance the existing macros to handle shadow registers. Signed-off-by: Bharat Bhushan

[PATCH 6/6] kvm: ppc: Add SPRN_SPR get helper function

2014-07-15 Thread Bharat Bhushan
kvmppc_set_epr() is already defined in asm/kvm_ppc.h, So rename and move get_epr helper function to same file. Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com --- arch/powerpc/include/asm/kvm_ppc.h | 9 + arch/powerpc/kvm/booke.c | 11 +-- 2 files changed,

[PATCH 4/6] kvm: ppc: booke: Add shared struct helpers of SPRN_ESR

2014-07-15 Thread Bharat Bhushan
Add and use kvmppc_set_esr() and kvmppc_get_esr() helper functions Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com --- arch/powerpc/include/asm/kvm_ppc.h | 1 + arch/powerpc/kvm/booke.c | 24 +++- 2 files changed, 4 insertions(+), 21 deletions(-) diff

[PATCH 2/6] kvm: ppc: booke: Use the shared struct helpers of SRR0 and SRR1

2014-07-15 Thread Bharat Bhushan
Use kvmppc_set_srr0/srr1() and kvmppc_get_srr0/srr1() helper functions Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com --- arch/powerpc/kvm/booke.c | 17 ++--- 1 file changed, 6 insertions(+), 11 deletions(-) diff --git a/arch/powerpc/kvm/booke.c

[PATCH 5/6] kvm: ppc: booke: Use the shared struct helpers for SPRN_SPRG0-7

2014-07-15 Thread Bharat Bhushan
Use kvmppc_set_sprg[0-7]() and kvmppc_get_sprg[0-7]() helper functions Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com --- arch/powerpc/kvm/booke.c | 32 arch/powerpc/kvm/booke_emulate.c | 8 2 files changed, 20 insertions(+), 20

[PATCH 3/6] kvm: ppc: booke: Use the shared struct helpers of SPRN_DEAR

2014-07-15 Thread Bharat Bhushan
Uses kvmppc_set_dar() and kvmppc_get_dar() helper functions Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com --- arch/powerpc/kvm/booke.c | 24 +++- 1 file changed, 3 insertions(+), 21 deletions(-) diff --git a/arch/powerpc/kvm/booke.c b/arch/powerpc/kvm/booke.c

Re: [PATCH 0/3] KVM: Make KVM_CHECK_EXTENSION a VM ioctl

2014-07-15 Thread Alexander Graf
Am 15.07.2014 um 08:50 schrieb Cornelia Huck cornelia.h...@de.ibm.com: On Mon, 14 Jul 2014 19:03:35 +0200 Alexander Graf ag...@suse.de wrote: On PowerPC we have a small problem :). We can run both HV and PR style VMs on the same kvm fd. While this is great, it means that anything that's

Re: [PATCH 0/3] KVM: Make KVM_CHECK_EXTENSION a VM ioctl

2014-07-15 Thread Paolo Bonzini
Il 14/07/2014 19:03, Alexander Graf ha scritto: On PowerPC we have a small problem :). We can run both HV and PR style VMs on the same kvm fd. While this is great, it means that anything that's different between the two needs to have a token in form of a VM fd to find out which one we're asking

Re: [RESEND PATCH v2 4/5] kvm: Remove ept_identity_pagetable from struct kvm_arch.

2014-07-15 Thread Tang Chen
On 07/14/2014 10:27 PM, Gleb Natapov wrote: .. if (likely(kvm-arch.ept_identity_pagetable_done)) return 1; - ret = 0; identity_map_pfn = kvm-arch.ept_identity_map_addr PAGE_SHIFT; + + mutex_lock(kvm-slots_lock); Why move this out of

Re: [PATCH 35/38] unicore32: clean-up uapi Kbuild file

2014-07-15 Thread James Hogan
On 14/07/14 16:09, Sam Ravnborg wrote: Remove redundant assignments. Signed-off-by: Sam Ravnborg s...@ravnborg.org Cc: Guan Xuetao g...@mprc.pku.edu.cn --- arch/unicore32/include/uapi/asm/Kbuild | 7 +-- 1 file changed, 1 insertion(+), 6 deletions(-) diff --git

Re: [PATCH 35/38] unicore32: clean-up uapi Kbuild file

2014-07-15 Thread Sam Ravnborg
Hi James. +# Wapper from asm-generic generic-y += kvm_para.h You dropped the generic-y += kvm_para.h for arm64 c6x, but not for unicore, avr32 ia64 patch, which seems a bit inconsistent. Was there some reason behind that? I was fooling around with kvm_para.h and in both cases

Re: [PATCH 0/6] Cleanup and fixes related to helper SPRN_XX functions

2014-07-15 Thread Alexander Graf
On 07/15/2014 09:01 AM, Bharat Bhushan wrote: These are primarily the cleanup patches, where shared struct get/set helper function are enhanced to handle shadow registers and uses those helper functions. Eventually this also fix SRR0/1 synchronization from userspace Bharat Bhushan (6): kvm:

Re: [PATCH v2 5/5] kvm, mem-hotplug: Do not pin apic access page in memory.

2014-07-15 Thread Jan Kiszka
On 2014-07-14 16:58, Gleb Natapov wrote: diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index ffbe557..7080eda 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -5929,6 +5929,18 @@ static void vcpu_scan_ioapic(struct kvm_vcpu *vcpu) kvm_apic_update_tmr(vcpu, tmr); }

Re: [PATCH v2 5/5] kvm, mem-hotplug: Do not pin apic access page in memory.

2014-07-15 Thread Gleb Natapov
On Tue, Jul 15, 2014 at 01:52:40PM +0200, Jan Kiszka wrote: On 2014-07-14 16:58, Gleb Natapov wrote: diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index ffbe557..7080eda 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -5929,6 +5929,18 @@ static void

Re: [PATCH v2 5/5] kvm, mem-hotplug: Do not pin apic access page in memory.

2014-07-15 Thread Tang Chen
On 07/15/2014 07:52 PM, Jan Kiszka wrote: On 2014-07-14 16:58, Gleb Natapov wrote: .. + struct page *page = gfn_to_page_no_pin(vcpu-kvm, + APIC_DEFAULT_PHYS_BASE PAGE_SHIFT); If you do not use kvm-arch.apic_access_page to get current address

Re: [PATCH v2 5/5] kvm, mem-hotplug: Do not pin apic access page in memory.

2014-07-15 Thread Tang Chen
On 07/15/2014 08:09 PM, Gleb Natapov wrote: On Tue, Jul 15, 2014 at 01:52:40PM +0200, Jan Kiszka wrote: .. I cannot follow your concerns yet. Specifically, how should APIC_ACCESS_ADDR (the VMCS field, right?) change while L2 is running? We currently pin/unpin on L1-L2/L2-L1, respectively.

Re: [PATCH v2 5/5] kvm, mem-hotplug: Do not pin apic access page in memory.

2014-07-15 Thread Gleb Natapov
On Tue, Jul 15, 2014 at 08:28:22PM +0800, Tang Chen wrote: On 07/15/2014 08:09 PM, Gleb Natapov wrote: On Tue, Jul 15, 2014 at 01:52:40PM +0200, Jan Kiszka wrote: .. I cannot follow your concerns yet. Specifically, how should APIC_ACCESS_ADDR (the VMCS field, right?) change while L2 is

Re: [PATCH v2 5/5] kvm, mem-hotplug: Do not pin apic access page in memory.

2014-07-15 Thread Tang Chen
On 07/15/2014 08:40 PM, Gleb Natapov wrote: On Tue, Jul 15, 2014 at 08:28:22PM +0800, Tang Chen wrote: On 07/15/2014 08:09 PM, Gleb Natapov wrote: On Tue, Jul 15, 2014 at 01:52:40PM +0200, Jan Kiszka wrote: .. I cannot follow your concerns yet. Specifically, how should APIC_ACCESS_ADDR

Re: [PATCH v2 5/5] kvm, mem-hotplug: Do not pin apic access page in memory.

2014-07-15 Thread Jan Kiszka
On 2014-07-15 14:40, Gleb Natapov wrote: .. 7922 if (!vmx-nested.apic_access_page) 7923 exec_control = 7924 ~SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES; 7925 else 7926

[GIT PULL 0/5] KVM: s390: Let user space control the cpu states

2014-07-15 Thread Christian Borntraeger
/kvm-s390-20140715 for you to fetch changes up to 6352e4d2dd9a349024a41356148eced553e1dce4: KVM: s390: implement KVM_(S|G)ET_MP_STATE for user space state control (2014-07-10 14:11:17 +0200) This series enables the KVM_(S|G

[GIT PULL 1/5] KVM: s390: allow only one SIGP STOP (AND STORE STATUS) at a time

2014-07-15 Thread Christian Borntraeger
From: David Hildenbrand d...@linux.vnet.ibm.com A SIGP STOP (AND STORE STATUS) order is complete as soon as the VCPU has been stopped. This patch makes sure that only one SIGP STOP (AND STORE STATUS) may be pending at a time (as defined by the architecture). If the action_bits are still set, a

[GIT PULL 4/5] KVM: prepare for KVM_(S|G)ET_MP_STATE on other architectures

2014-07-15 Thread Christian Borntraeger
From: David Hildenbrand d...@linux.vnet.ibm.com Highlight the aspects of the ioctls that are actually specific to x86 and ia64. As defined restrictions (irqchip) and mp states may not apply to other architectures, these parts are flagged to belong to x86 and ia64. In preparation for the use of

[GIT PULL 3/5] KVM: s390: remove __cpu_is_stopped and expose is_vcpu_stopped

2014-07-15 Thread Christian Borntraeger
From: David Hildenbrand d...@linux.vnet.ibm.com The function __cpu_is_stopped is not used any more. Let's remove it and expose the function is_vcpu_stopped instead, which is actually what we want. This patch also converts an open coded check for CPUSTAT_STOPPED to is_vcpu_stopped().

[GIT PULL 2/5] KVM: s390: move finalization of SIGP STOP orders to kvm_s390_vcpu_stop

2014-07-15 Thread Christian Borntraeger
From: David Hildenbrand d...@linux.vnet.ibm.com Let's move the finalization of SIGP STOP and SIGP STOP AND STORE STATUS orders to the point where the VCPU is actually stopped. This change is needed to prepare for a user space driven VCPU state change. The action_bits may only be cleared when

[GIT PULL 5/5] KVM: s390: implement KVM_(S|G)ET_MP_STATE for user space state control

2014-07-15 Thread Christian Borntraeger
From: David Hildenbrand d...@linux.vnet.ibm.com This patch - adds s390 specific MP states to linux headers and documents them - implements the KVM_{SET,GET}_MP_STATE ioctls - enables KVM_CAP_MP_STATE - allows user space to control the VCPU state on s390. If user space sets the VCPU state using

Re: [PATCH v2 5/5] kvm, mem-hotplug: Do not pin apic access page in memory.

2014-07-15 Thread Gleb Natapov
On Tue, Jul 15, 2014 at 03:10:15PM +0200, Jan Kiszka wrote: On 2014-07-15 14:40, Gleb Natapov wrote: .. 7922 if (!vmx-nested.apic_access_page) 7923 exec_control = 7924 ~SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES; 7925

Re: [PATCH 10/11] qspinlock: Paravirt support

2014-07-15 Thread Konrad Rzeszutek Wilk
On Mon, Jul 07, 2014 at 05:27:34PM +0200, Peter Zijlstra wrote: On Fri, Jun 20, 2014 at 09:46:08AM -0400, Konrad Rzeszutek Wilk wrote: I dug in the code and I have some comments about it, but before I post them I was wondering if you have any plans to run any performance tests against the

[PATCH] KVM: x86: DR6/7.RTM cannot be written

2014-07-15 Thread Nadav Amit
Haswell and newer Intel CPUs have support for RTM, and in that case DR6.RTM is not fixed to 1 and DR7.RTM is not fixed to zero. That is not the case in the current KVM implementation. This bug is apparent only if the MOV-DR instruction is emulated or the host also debugs the guest. This patch is

Re: [PATCH v2 5/5] kvm, mem-hotplug: Do not pin apic access page in memory.

2014-07-15 Thread Gleb Natapov
On Tue, Jul 15, 2014 at 08:54:01PM +0800, Tang Chen wrote: On 07/15/2014 08:40 PM, Gleb Natapov wrote: On Tue, Jul 15, 2014 at 08:28:22PM +0800, Tang Chen wrote: On 07/15/2014 08:09 PM, Gleb Natapov wrote: On Tue, Jul 15, 2014 at 01:52:40PM +0200, Jan Kiszka wrote: .. I cannot follow

[PATCH kvm-unit-tests] x86: Check DR6.RTM is writable

2014-07-15 Thread Nadav Amit
Recently discovered bug shows DR6.RTM is fixed to one. The bug is only apparent when the host emulates the MOV-DR instruction or when the host debugs the guest kernel. This patch tests whether DR6.RTM is indeed accessible according to RTM support as reported by cpuid. Signed-off-by: Nadav Amit

Re: [PATCH V6 1/2] perf ignore LBR and extra_rsp

2014-07-15 Thread Peter Zijlstra
On Mon, Jul 14, 2014 at 12:25:56PM -0700, kan.li...@intel.com wrote: Close enough. +#define EVENT_EXTRA_REG(e, ms, m, vm, i, a) {\ + .event = (e), \ + .msr = (ms),\ + .config_mask = (m), \ + .valid_mask = (vm),

RE: [PATCH V6 1/2] perf ignore LBR and extra_rsp

2014-07-15 Thread Liang, Kan
Since nobody ever treats EVENT_EXTRA_END as an actual event, the value of .extra_msr_access is irrelevant, this leaves the only 'possible' value 'true' and we can delete all those changes. Right. Which, combined with a few whitespace cleanups, gives the below patch. Thanks. Your

Re: [PATCH V6 1/2] perf ignore LBR and extra_rsp

2014-07-15 Thread Peter Zijlstra
On Tue, Jul 15, 2014 at 03:32:36PM +, Liang, Kan wrote: Since nobody ever treats EVENT_EXTRA_END as an actual event, the value of .extra_msr_access is irrelevant, this leaves the only 'possible' value 'true' and we can delete all those changes. Right. Which, combined with

Re: [PATCH v6 06/17] Introduce alloc_ops

2014-07-15 Thread Andrew Jones
On Fri, Jul 11, 2014 at 12:07:25PM +0200, Andrew Jones wrote: On Fri, Jul 11, 2014 at 11:41:34AM +0200, Paolo Bonzini wrote: Il 11/07/2014 10:55, Andrew Jones ha scritto: On Fri, Jul 11, 2014 at 10:40:42AM +0200, Paolo Bonzini wrote: Il 11/07/2014 10:19, Andrew Jones ha scritto: alloc_ops

Re: [PATCH v6 00/17] kvm-unit-tests/arm: initial drop

2014-07-15 Thread Andrew Jones
On Fri, Jul 11, 2014 at 10:47:00AM +0200, Paolo Bonzini wrote: Il 11/07/2014 10:19, Andrew Jones ha scritto: This is a v6 of a series that introduces arm to kvm-unit-tests. As the tidy-up patches from v5 have already been merged (thanks!), these are just the remaining patches. Although there

Re: [PATCH v6 07/17] add minimal virtio support for devtree virtio-mmio

2014-07-15 Thread Andrew Jones
On Fri, Jul 11, 2014 at 11:08:28AM +0200, Andrew Jones wrote: On Fri, Jul 11, 2014 at 10:32:51AM +0200, Paolo Bonzini wrote: Il 11/07/2014 10:19, Andrew Jones ha scritto: +enum virtio_hwdesc_type { + VIRTIO_HWDESC_TYPE_DT = 0, /* device tree */ + NR_VIRTIO_HWDESC_TYPES, +}; +

Re: [PATCH v2] kvmclock: Ensure time in migration never goes backward

2014-07-15 Thread Paolo Bonzini
Il 16/05/2014 17:15, Alexander Graf ha scritto: When we migrate we ask the kernel about its current belief on what the guest time would be. However, I've seen cases where the kvmclock guest structure indicates a time more recent than the kvm returned time. To make sure we never go backwards,

Re: [PATCH v6 00/17] kvm-unit-tests/arm: initial drop

2014-07-15 Thread Paolo Bonzini
Il 15/07/2014 19:24, Andrew Jones ha scritto: On Fri, Jul 11, 2014 at 10:47:00AM +0200, Paolo Bonzini wrote: Il 11/07/2014 10:19, Andrew Jones ha scritto: This is a v6 of a series that introduces arm to kvm-unit-tests. As the tidy-up patches from v5 have already been merged (thanks!), these

[3.13.y.z extended stable] Patch MIPS: KVM: Allocate at least 16KB for exception handlers has been added to staging queue

2014-07-15 Thread Kamal Mostafa
This is a note to let you know that I have just added a patch titled MIPS: KVM: Allocate at least 16KB for exception handlers to the linux-3.13.y-queue branch of the 3.13.y.z extended stable tree which can be found at:

[PATCH 3.13 076/198] MIPS: KVM: Allocate at least 16KB for exception handlers

2014-07-15 Thread Kamal Mostafa
3.13.11.5 -stable review patch. If anyone has any objections, please let me know. -- From: James Hogan james.ho...@imgtec.com commit 7006e2dfda9adfa40251093604db76d7e44263b3 upstream. Each MIPS KVM guest has its own copy of the KVM exception vector. This contains the TLB

[PATCH 0/4] random,x86,kvm: Add and use MSR_KVM_GET_RNG_SEED

2014-07-15 Thread Andy Lutomirski
virtio-rng is both too complicated and insufficient for initial rng seeding. It's far too complicated to use for KASLR or any other early boot random number needs. It also provides /dev/random-style bits, which means that making guest boot wait for virtio-rng is unacceptably slow, and doing it

[PATCH 1/4] x86,kvm: Add MSR_KVM_GET_RNG_SEED and a matching feature bit

2014-07-15 Thread Andy Lutomirski
This adds a simple interface to allow a guest to request 64 bits of host nonblocking entropy. This is independent of virtio-rng for a couple of reasons: - It's intended to be usable during early boot, when a trivial synchronous interface is needed. - virtio-rng gives blocking entropy, and

[PATCH 3/4] random: Seed pools from arch_get_slow_rng_u64 at startup

2014-07-15 Thread Andy Lutomirski
This should help solve the problem of guests starting out with predictable RNG state. Signed-off-by: Andy Lutomirski l...@amacapital.net --- drivers/char/random.c | 14 +- 1 file changed, 13 insertions(+), 1 deletion(-) diff --git a/drivers/char/random.c b/drivers/char/random.c

[PATCH 2/4] random,x86: Add arch_get_slow_rng_u64

2014-07-15 Thread Andy Lutomirski
arch_get_slow_rng_u64 tries to get 64 bits of RNG seed data. Unlike arch_get_random_{bytes,seed}, etc., it makes no claims about entropy content. It's also likely to be much slower and should not be used frequently. That being said, it should be fast enough to call several times during boot

[PATCH 4/4] x86,kaslr: Use MSR_KVM_GET_RNG_SEED for KASLR if available

2014-07-15 Thread Andy Lutomirski
It's considerably better than any of the alternatives on KVM. Signed-off-by: Andy Lutomirski l...@amacapital.net --- arch/x86/boot/compressed/aslr.c | 27 +++ 1 file changed, 27 insertions(+) diff --git a/arch/x86/boot/compressed/aslr.c b/arch/x86/boot/compressed/aslr.c

[PATCH kvm-unit-tests] Add a test case for MSR_KVM_GET_RNG_SEED

2014-07-15 Thread Andy Lutomirski
Signed-off-by: Andy Lutomirski l...@amacapital.net --- config/config-x86-common.mak | 5 - x86/get_rng_seed.c | 50 x86/unittests.cfg| 3 +++ 3 files changed, 57 insertions(+), 1 deletion(-) create mode 100644

[PATCH] kvm: ppc: bookehv: Save restore SPRN_SPRG9 on guest entry exit

2014-07-15 Thread Bharat Bhushan
SPRN_SPRG is used by debug interrupt handler, so this is required for debug support. Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com --- arch/powerpc/include/asm/kvm_host.h | 1 + arch/powerpc/kernel/asm-offsets.c | 1 + arch/powerpc/kvm/bookehv_interrupts.S | 4 3 files

[PATCH 4/6] kvm: ppc: booke: Add shared struct helpers of SPRN_ESR

2014-07-15 Thread Bharat Bhushan
Add and use kvmppc_set_esr() and kvmppc_get_esr() helper functions Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com --- arch/powerpc/include/asm/kvm_ppc.h | 1 + arch/powerpc/kvm/booke.c | 24 +++- 2 files changed, 4 insertions(+), 21 deletions(-) diff

[PATCH 2/6] kvm: ppc: booke: Use the shared struct helpers of SRR0 and SRR1

2014-07-15 Thread Bharat Bhushan
Use kvmppc_set_srr0/srr1() and kvmppc_get_srr0/srr1() helper functions Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com --- arch/powerpc/kvm/booke.c | 17 ++--- 1 file changed, 6 insertions(+), 11 deletions(-) diff --git a/arch/powerpc/kvm/booke.c

[PATCH 3/6] kvm: ppc: booke: Use the shared struct helpers of SPRN_DEAR

2014-07-15 Thread Bharat Bhushan
Uses kvmppc_set_dar() and kvmppc_get_dar() helper functions Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com --- arch/powerpc/kvm/booke.c | 24 +++- 1 file changed, 3 insertions(+), 21 deletions(-) diff --git a/arch/powerpc/kvm/booke.c b/arch/powerpc/kvm/booke.c

Re: [PATCH 0/3] KVM: Make KVM_CHECK_EXTENSION a VM ioctl

2014-07-15 Thread Alexander Graf
Am 15.07.2014 um 08:50 schrieb Cornelia Huck cornelia.h...@de.ibm.com: On Mon, 14 Jul 2014 19:03:35 +0200 Alexander Graf ag...@suse.de wrote: On PowerPC we have a small problem :). We can run both HV and PR style VMs on the same kvm fd. While this is great, it means that anything that's

Re: [PATCH 6/6] kvm: ppc: Add SPRN_SPR get helper function

2014-07-15 Thread mihai.cara...@freescale.com
kvmppc_set_epr() is already defined in asm/kvm_ppc.h, So rename and move get_epr helper function to same file. Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com --- arch/powerpc/include/asm/kvm_ppc.h | 9 + arch/powerpc/kvm/booke.c | 11 +-- 2 files

RE: Re: [PATCH 6/6] kvm: ppc: Add SPRN_SPR get helper function

2014-07-15 Thread bharat.bhus...@freescale.com
-Original Message- From: Caraman Mihai Claudiu-B02008 Sent: Tuesday, July 15, 2014 10:20 PM To: Alexander Graf Cc: Bhushan Bharat-R65777; kvm-ppc@vger.kernel.org Subject: Re: [PATCH 6/6] kvm: ppc: Add SPRN_SPR get helper function kvmppc_set_epr() is already defined in

[PATCH] kvm: ppc: bookehv: Save restore SPRN_SPRG9 on guest entry exit

2014-07-15 Thread Bharat Bhushan
SPRN_SPRG is used by debug interrupt handler, so this is required for debug support. Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com --- arch/powerpc/include/asm/kvm_host.h | 1 + arch/powerpc/kernel/asm-offsets.c | 1 + arch/powerpc/kvm/bookehv_interrupts.S | 4 3 files