From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:47032) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1X6eoF-0002Hi-LZ for qemu-devel@nongnu.org; Mon, 14 Jul 2014 07:52:51 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1X6eo7-0002vJ-Bn for qemu-devel@nongnu.org; Mon, 14 Jul 2014 07:52:43 -0400 Received: from e28smtp05.in.ibm.com ([122.248.162.5]:33255) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1X6eo6-0002uM-N9 for qemu-devel@nongnu.org; Mon, 14 Jul 2014 07:52:35 -0400 Received: from /spool/local by e28smtp05.in.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Mon, 14 Jul 2014 17:22:31 +0530 Message-ID: <53C3C479.6090705@linux.vnet.ibm.com> Date: Mon, 14 Jul 2014 17:22:25 +0530 From: Madhavan Srinivasan MIME-Version: 1.0 References: <1405329338-10206-1-git-send-email-Bharat.Bhushan@freescale.com> <1405329338-10206-2-git-send-email-Bharat.Bhushan@freescale.com> In-Reply-To: <1405329338-10206-2-git-send-email-Bharat.Bhushan@freescale.com> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Subject: Re: [Qemu-devel] [PATCH 1/4 v8] ppc: debug stub: Get trap instruction opcode from KVM List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Bharat Bhushan , agraf@suse.de Cc: qemu-ppc@nongnu.org, qemu-devel@nongnu.org On Monday 14 July 2014 02:45 PM, Bharat Bhushan wrote: > Get trap instruction opcode from KVM and this opcode will > be used for setting software breakpoint in following patch > > Signed-off-by: Bharat Bhushan > --- > v7->v8 > - No change > Reviewed By: Madhavan Srinivasan > target-ppc/kvm.c | 4 ++++ > 1 file changed, 4 insertions(+) > > diff --git a/target-ppc/kvm.c b/target-ppc/kvm.c > index 2d87108..4df23dd 100644 > --- a/target-ppc/kvm.c > +++ b/target-ppc/kvm.c > @@ -72,6 +72,8 @@ static int cap_papr; > static int cap_htab_fd; > static int cap_fixup_hcalls; > > +static uint32_t debug_inst_opcode; > + > /* XXX We have a race condition where we actually have a level triggered > * interrupt, but the infrastructure can't expose that yet, so the guest > * takes but ignores it, goes to sleep and never gets notified that there's > @@ -436,6 +438,8 @@ int kvm_arch_init_vcpu(CPUState *cs) > break; > } > > + kvm_get_one_reg(cs, KVM_REG_PPC_DEBUG_INST, &debug_inst_opcode); > + > return ret; > } >