From mboxrd@z Thu Jan 1 00:00:00 1970 From: Alexander Graf Date: Tue, 09 Sep 2014 21:15:48 +0000 Subject: Re: [PATCH 0/2 v6] powerpc/kvm: support to handle sw breakpoint Message-Id: <540F6E04.1030601@suse.de> List-Id: References: <1410282456-11287-1-git-send-email-maddy@linux.vnet.ibm.com> In-Reply-To: <1410282456-11287-1-git-send-email-maddy@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: Madhavan Srinivasan , benh@kernel.crashing.org, paulus@samba.org, mpe@ellerman.id.au Cc: linuxppc-dev@lists.ozlabs.org, kvm@vger.kernel.org, kvm-ppc@vger.kernel.org On 09.09.14 19:07, Madhavan Srinivasan wrote: > This patchset adds ppc64 server side support for software breakpoint > and extends the use of illegal instruction as software > breakpoint across ppc platform. > > Patch 1, adds kernel side support for software breakpoint. > Design is that, by using an illegal instruction, we trap to > hypervisor via Emulation Assistance interrupt, where we check > for the illegal instruction and accordingly we return to Host > or Guest. Patch also adds support for software breakpoint > in PR KVM. > > Patch 2,extends the use of illegal instruction as software > breakpoint instruction across the ppc platform. Patch extends > booke program interrupt code to support software breakpoint. Thanks, applied to kvm-ppc-queue. Alex From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx2.suse.de (cantor2.suse.de [195.135.220.15]) (using TLSv1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 5C2671A000C for ; Wed, 10 Sep 2014 07:15:51 +1000 (EST) Message-ID: <540F6E04.1030601@suse.de> Date: Tue, 09 Sep 2014 23:15:48 +0200 From: Alexander Graf MIME-Version: 1.0 To: Madhavan Srinivasan , benh@kernel.crashing.org, paulus@samba.org, mpe@ellerman.id.au Subject: Re: [PATCH 0/2 v6] powerpc/kvm: support to handle sw breakpoint References: <1410282456-11287-1-git-send-email-maddy@linux.vnet.ibm.com> In-Reply-To: <1410282456-11287-1-git-send-email-maddy@linux.vnet.ibm.com> Content-Type: text/plain; charset=windows-1252 Cc: linuxppc-dev@lists.ozlabs.org, kvm-ppc@vger.kernel.org, kvm@vger.kernel.org List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On 09.09.14 19:07, Madhavan Srinivasan wrote: > This patchset adds ppc64 server side support for software breakpoint > and extends the use of illegal instruction as software > breakpoint across ppc platform. > > Patch 1, adds kernel side support for software breakpoint. > Design is that, by using an illegal instruction, we trap to > hypervisor via Emulation Assistance interrupt, where we check > for the illegal instruction and accordingly we return to Host > or Guest. Patch also adds support for software breakpoint > in PR KVM. > > Patch 2,extends the use of illegal instruction as software > breakpoint instruction across the ppc platform. Patch extends > booke program interrupt code to support software breakpoint. Thanks, applied to kvm-ppc-queue. Alex From mboxrd@z Thu Jan 1 00:00:00 1970 From: Alexander Graf Subject: Re: [PATCH 0/2 v6] powerpc/kvm: support to handle sw breakpoint Date: Tue, 09 Sep 2014 23:15:48 +0200 Message-ID: <540F6E04.1030601@suse.de> References: <1410282456-11287-1-git-send-email-maddy@linux.vnet.ibm.com> Mime-Version: 1.0 Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Cc: linuxppc-dev@lists.ozlabs.org, kvm@vger.kernel.org, kvm-ppc@vger.kernel.org To: Madhavan Srinivasan , benh@kernel.crashing.org, paulus@samba.org, mpe@ellerman.id.au Return-path: In-Reply-To: <1410282456-11287-1-git-send-email-maddy@linux.vnet.ibm.com> Sender: kvm-ppc-owner@vger.kernel.org List-Id: kvm.vger.kernel.org On 09.09.14 19:07, Madhavan Srinivasan wrote: > This patchset adds ppc64 server side support for software breakpoint > and extends the use of illegal instruction as software > breakpoint across ppc platform. > > Patch 1, adds kernel side support for software breakpoint. > Design is that, by using an illegal instruction, we trap to > hypervisor via Emulation Assistance interrupt, where we check > for the illegal instruction and accordingly we return to Host > or Guest. Patch also adds support for software breakpoint > in PR KVM. > > Patch 2,extends the use of illegal instruction as software > breakpoint instruction across the ppc platform. Patch extends > booke program interrupt code to support software breakpoint. Thanks, applied to kvm-ppc-queue. Alex