Introduced PPC_STD/PPC_LD macros for saving/restoring guest registers to/from
their 64 bit copies.
Signed-off-by: Varun Sethi
---
arch/powerpc/include/asm/kvm_asm.h|8
arch/powerpc/kvm/bookehv_interrupts.S | 24
2 files changed, 12 insertions(+), 20
For Guest accessible SPRGs 4-7, save/restore must be handled differently for
64bit and
non-64 bit case. Use the PPC_STD/PPC_LD macros for saving/restoring to/from
these registers.
Signed-off-by: Varun Sethi
---
arch/powerpc/kvm/booke_interrupts.S |8
arch/powerpc/kvm
For Guest accessible SPRGs 4-7, save/restore must be handled differently for
64bit and
non-64 bit case. Use the PPC_STD/PPC_LD macros for saving/restoring to/from
these registers.
Signed-off-by: Varun Sethi
---
arch/powerpc/kvm/booke_interrupts.S |8
arch/powerpc/kvm
While restoring the hardware copies of guest SPRG4-7 registers we must use the
the lower 4 bytes of the 64 bit sotware copies maintained by KVM.
Signed-off-by: Varun Sethi
---
arch/powerpc/kvm/booke_interrupts.S |8
1 files changed, 4 insertions(+), 4 deletions(-)
diff --git a
For Guest accessible SPRGs 4-7, save/restore must be handled differently for
64bit and
non-64 bit case. The registers are maintained as 64 bit copies by KVM. While
saving/restoring
for the non-64 bit case we should always take the lower 4 bytes.
Signed-off-by: Varun Sethi
---
arch/powerpc/kvm
For Guest accessible SPRGs 4-7, save/restore must be handled differently for
64bit and
non-64 bit case. The registers are maintained as 64 bit copies by KVM. While
saving/restoring
for the non-64 bit case we should always take the lower 4 bytes.
Signed-off-by: Varun Sethi
---
arch/powerpc/kvm
For Guest accessible SPRGs 4-7, save/restore must be handled differently for
64bit and
non-64 bit case. The registers are maintained as 64 bit copies by KVM. While
saving/restoring
for the non-64 bit case we should always take the lower 4 bytes.
Signed-off-by: Varun Sethi
---
arch/powerpc/kvm
played to bring
> the IOMMU pagetables up to the state of the current container. And of
> course, DMA mapping and unmapping automatically traverse all of the
> configured IOMMU domains.
>
> Signed-off-by: Alex Williamson
> Cc: Varun Sethi
> ---
> drivers/vfio/vfio_iommu_
> -Original Message-
> From: iommu-boun...@lists.linux-foundation.org [mailto:iommu-
> boun...@lists.linux-foundation.org] On Behalf Of Antonios Motakis
> Sent: Thursday, June 05, 2014 10:33 PM
> To: alex.william...@redhat.com; kvm...@lists.cs.columbia.edu;
> io...@lists.linux-foundation.