Re: [PATCH v2 05/10] spapr, ppc: Remove VPM0/RMLS hacks for POWER9

2020-01-12 Thread David Gibson
On Thu, Jan 09, 2020 at 06:33:36PM +1100, Alexey Kardashevskiy wrote: > > > On 07/01/2020 15:48, David Gibson wrote: > > For the "pseries" machine, we use "virtual hypervisor" mode where we only > > model the CPU in non-hypervisor privileged mode. This means that we need > > guest physical addre

Re: [PATCH v2 05/10] spapr, ppc: Remove VPM0/RMLS hacks for POWER9

2020-01-08 Thread Alexey Kardashevskiy
On 07/01/2020 15:48, David Gibson wrote: > For the "pseries" machine, we use "virtual hypervisor" mode where we only > model the CPU in non-hypervisor privileged mode. This means that we need > guest physical addresses within the modelled within the cpu to be treated > as absolute physical addr

Re: [PATCH v2 05/10] spapr, ppc: Remove VPM0/RMLS hacks for POWER9

2020-01-07 Thread Cédric Le Goater
On 1/7/20 5:48 AM, David Gibson wrote: > For the "pseries" machine, we use "virtual hypervisor" mode where we only > model the CPU in non-hypervisor privileged mode. This means that we need > guest physical addresses within the modelled within the cpu to be treated > as absolute physical addresses

[PATCH v2 05/10] spapr, ppc: Remove VPM0/RMLS hacks for POWER9

2020-01-06 Thread David Gibson
For the "pseries" machine, we use "virtual hypervisor" mode where we only model the CPU in non-hypervisor privileged mode. This means that we need guest physical addresses within the modelled within the cpu to be treated as absolute physical addresses. We used to do that by clearing LPCR[VPM0] an