Re: [RFC PATCH 14/16] KVM: PPC: booke: category E.HV (GS-mode) support

2012-02-15 Thread Alexander Graf
On 15.02.2012, at 20:40, Scott Wood wrote: > On 02/15/2012 01:36 PM, Alexander Graf wrote: >> >> On 10.01.2012, at 01:51, Scott Wood wrote: >>> I was thinking we'd check ESR[EPID] or SRR1[IS] as appropriate, and >>> treat it as a kernel fault (search exception table) -- but this works >>> too an

Re: [RFC PATCH 14/16] KVM: PPC: booke: category E.HV (GS-mode) support

2012-02-15 Thread Scott Wood
On 02/15/2012 01:36 PM, Alexander Graf wrote: > > On 10.01.2012, at 01:51, Scott Wood wrote: >> I was thinking we'd check ESR[EPID] or SRR1[IS] as appropriate, and >> treat it as a kernel fault (search exception table) -- but this works >> too and is a bit cleaner (could be other uses of external

Re: [RFC PATCH 14/16] KVM: PPC: booke: category E.HV (GS-mode) support

2012-02-15 Thread Alexander Graf
On 10.01.2012, at 01:51, Scott Wood wrote: > On 01/09/2012 11:46 AM, Alexander Graf wrote: >> >> On 21.12.2011, at 02:34, Scott Wood wrote: > [...] >>> Current issues include: >>> - Machine checks from guest state are not routed to the host handler. >>> - The guest can cause a host oops by ex

Re: [RFC PATCH 14/16] KVM: PPC: booke: category E.HV (GS-mode) support

2012-01-12 Thread Scott Wood
On Thu, Jan 12, 2012 at 05:44:26PM +1100, Benjamin Herrenschmidt wrote: > On Tue, 2012-01-10 at 04:11 +0100, Alexander Graf wrote: > > This is what book3s does: > > > > case EMULATE_FAIL: > > printk(KERN_CRIT "%s: emulation at %lx failed > > (%08x)\n", > >

Re: [RFC PATCH 14/16] KVM: PPC: booke: category E.HV (GS-mode) support

2012-01-11 Thread Alexander Graf
On 12.01.2012, at 07:44, Benjamin Herrenschmidt wrote: > On Tue, 2012-01-10 at 04:11 +0100, Alexander Graf wrote: >> This is what book3s does: >> >>case EMULATE_FAIL: >>printk(KERN_CRIT "%s: emulation at %lx failed >> (%08x)\n", >>

Re: [RFC PATCH 14/16] KVM: PPC: booke: category E.HV (GS-mode) support

2012-01-11 Thread Benjamin Herrenschmidt
On Tue, 2012-01-10 at 04:11 +0100, Alexander Graf wrote: > This is what book3s does: > > case EMULATE_FAIL: > printk(KERN_CRIT "%s: emulation at %lx failed > (%08x)\n", >__func__, kvmppc_get_pc(vcpu), > kvmppc_get_last_inst(vc

Re: [RFC PATCH 14/16] KVM: PPC: booke: category E.HV (GS-mode) support

2012-01-10 Thread Alexander Graf
On 10.01.2012, at 23:03, Scott Wood wrote: > On 01/09/2012 09:11 PM, Alexander Graf wrote: >> On 10.01.2012, at 01:51, Scott Wood wrote: >>> On 01/09/2012 11:46 AM, Alexander Graf wrote: On 21.12.2011, at 02:34, Scott Wood wrote: > + /* For debugging, encode the failing instructi

Re: [RFC PATCH 14/16] KVM: PPC: booke: category E.HV (GS-mode) support

2012-01-10 Thread Scott Wood
On 01/09/2012 09:11 PM, Alexander Graf wrote: > On 10.01.2012, at 01:51, Scott Wood wrote: >> On 01/09/2012 11:46 AM, Alexander Graf wrote: >>> On 21.12.2011, at 02:34, Scott Wood wrote: + /* For debugging, encode the failing instruction and + * report it to userspace.

Re: [RFC PATCH 14/16] KVM: PPC: booke: category E.HV (GS-mode) support

2012-01-09 Thread Alexander Graf
On 10.01.2012, at 01:51, Scott Wood wrote: > On 01/09/2012 11:46 AM, Alexander Graf wrote: >> >> On 21.12.2011, at 02:34, Scott Wood wrote: >> >>> Chips such as e500mc that implement category E.HV in Power ISA 2.06 >>> provide hardware virtualization features, including a new MSR mode for >>> g

Re: [RFC PATCH 14/16] KVM: PPC: booke: category E.HV (GS-mode) support

2012-01-09 Thread Scott Wood
On 01/09/2012 11:46 AM, Alexander Graf wrote: > > On 21.12.2011, at 02:34, Scott Wood wrote: > >> Chips such as e500mc that implement category E.HV in Power ISA 2.06 >> provide hardware virtualization features, including a new MSR mode for >> guest state. The guest OS can perform many operations

[RFC PATCH 14/16] KVM: PPC: booke: category E.HV (GS-mode) support

2011-12-20 Thread Scott Wood
Chips such as e500mc that implement category E.HV in Power ISA 2.06 provide hardware virtualization features, including a new MSR mode for guest state. The guest OS can perform many operations without trapping into the hypervisor, including transitions to and from guest userspace. Since we can us