Re: [PATCH] tcm_vhost: Avoid VIRTIO_RING_F_EVENT_IDX feature bit

2013-03-28 Thread Michael S. Tsirkin
On Thu, Mar 28, 2013 at 12:27:10AM +, Nicholas A. Bellinger wrote: From: Nicholas Bellinger n...@linux-iscsi.org This patch adds a VHOST_TCM_FEATURES mask minus VIRTIO_RING_F_EVENT_IDX so that vhost-scsi-pci userspace will strip this feature bit once GET_FEATURES reports it as being

Re: [PATCH V2 2/2] tcm_vhost: Use vq-private_data to indicate if the endpoint is setup

2013-03-28 Thread Michael S. Tsirkin
On Thu, Mar 28, 2013 at 10:17:28AM +0800, Asias He wrote: Currently, vs-vs_endpoint is used indicate if the endpoint is setup or not. It is set or cleared in vhost_scsi_set_endpoint() or vhost_scsi_clear_endpoint() under the vs-dev.mutex lock. However, when we check it in

Re: [PATCH 2/3] vhost-scsi: new device supporting the tcm_vhost Linux kernel module

2013-03-28 Thread Michael S. Tsirkin
On Wed, Mar 27, 2013 at 04:24:22PM -0700, Nicholas A. Bellinger wrote: On Thu, 2013-03-28 at 00:53 +0200, Michael S. Tsirkin wrote: On Thu, Mar 28, 2013 at 12:50:21AM +0200, Michael S. Tsirkin wrote: On Wed, Mar 27, 2013 at 03:45:42PM -0700, Nicholas A. Bellinger wrote: On Thu,

Re: [PATCH] tcm_vhost: Avoid VIRTIO_RING_F_EVENT_IDX feature bit

2013-03-28 Thread Nicholas A. Bellinger
On Thu, 2013-03-28 at 08:04 +0200, Michael S. Tsirkin wrote: On Thu, Mar 28, 2013 at 12:27:10AM +, Nicholas A. Bellinger wrote: From: Nicholas Bellinger n...@linux-iscsi.org This patch adds a VHOST_TCM_FEATURES mask minus VIRTIO_RING_F_EVENT_IDX so that vhost-scsi-pci userspace will

Re: [PATCH 2/3] vhost-scsi: new device supporting the tcm_vhost Linux kernel module

2013-03-28 Thread Nicholas A. Bellinger
On Thu, 2013-03-28 at 08:19 +0200, Michael S. Tsirkin wrote: On Wed, Mar 27, 2013 at 04:24:22PM -0700, Nicholas A. Bellinger wrote: On Thu, 2013-03-28 at 00:53 +0200, Michael S. Tsirkin wrote: On Thu, Mar 28, 2013 at 12:50:21AM +0200, Michael S. Tsirkin wrote: On Wed, Mar 27, 2013 at

Re: [PATCH V3 WIP 3/3] disable vhost_verify_ring_mappings check

2013-03-28 Thread Nicholas A. Bellinger
On Wed, 2013-03-27 at 15:33 -0700, Nicholas A. Bellinger wrote: On Wed, 2013-03-27 at 23:56 +0200, Michael S. Tsirkin wrote: On Wed, Mar 27, 2013 at 02:31:27PM -0700, Nicholas A. Bellinger wrote: On Wed, 2013-03-20 at 11:51 +0200, Michael S. Tsirkin wrote: On Tue, Mar 19, 2013 at

Re: [PATCH V3 WIP 3/3] disable vhost_verify_ring_mappings check

2013-03-28 Thread Nicholas A. Bellinger
On Wed, 2013-03-27 at 23:45 -0700, Nicholas A. Bellinger wrote: On Wed, 2013-03-27 at 15:33 -0700, Nicholas A. Bellinger wrote: On Wed, 2013-03-27 at 23:56 +0200, Michael S. Tsirkin wrote: On Wed, Mar 27, 2013 at 02:31:27PM -0700, Nicholas A. Bellinger wrote: SNIP Adding a bit more

Re: [PATCH V2 2/2] tcm_vhost: Use vq-private_data to indicate if the endpoint is setup

2013-03-28 Thread Asias He
On Thu, Mar 28, 2013 at 08:16:59AM +0200, Michael S. Tsirkin wrote: On Thu, Mar 28, 2013 at 10:17:28AM +0800, Asias He wrote: Currently, vs-vs_endpoint is used indicate if the endpoint is setup or not. It is set or cleared in vhost_scsi_set_endpoint() or vhost_scsi_clear_endpoint() under

Re: [PATCH V2 2/2] tcm_vhost: Use vq-private_data to indicate if the endpoint is setup

2013-03-28 Thread Michael S. Tsirkin
On Thu, Mar 28, 2013 at 04:10:02PM +0800, Asias He wrote: On Thu, Mar 28, 2013 at 08:16:59AM +0200, Michael S. Tsirkin wrote: On Thu, Mar 28, 2013 at 10:17:28AM +0800, Asias He wrote: Currently, vs-vs_endpoint is used indicate if the endpoint is setup or not. It is set or cleared in

Re: [PATCH V2 2/2] tcm_vhost: Use vq-private_data to indicate if the endpoint is setup

2013-03-28 Thread Asias He
On Thu, Mar 28, 2013 at 10:33:30AM +0200, Michael S. Tsirkin wrote: On Thu, Mar 28, 2013 at 04:10:02PM +0800, Asias He wrote: On Thu, Mar 28, 2013 at 08:16:59AM +0200, Michael S. Tsirkin wrote: On Thu, Mar 28, 2013 at 10:17:28AM +0800, Asias He wrote: Currently, vs-vs_endpoint is used

Re: [PATCH V3 WIP 3/3] disable vhost_verify_ring_mappings check

2013-03-28 Thread Michael S. Tsirkin
On Thu, Mar 28, 2013 at 12:35:42AM -0700, Nicholas A. Bellinger wrote: On Wed, 2013-03-27 at 23:45 -0700, Nicholas A. Bellinger wrote: On Wed, 2013-03-27 at 15:33 -0700, Nicholas A. Bellinger wrote: On Wed, 2013-03-27 at 23:56 +0200, Michael S. Tsirkin wrote: On Wed, Mar 27, 2013 at

Re: [PATCH V2 2/2] tcm_vhost: Use vq-private_data to indicate if the endpoint is setup

2013-03-28 Thread Michael S. Tsirkin
On Thu, Mar 28, 2013 at 04:47:15PM +0800, Asias He wrote: On Thu, Mar 28, 2013 at 10:33:30AM +0200, Michael S. Tsirkin wrote: On Thu, Mar 28, 2013 at 04:10:02PM +0800, Asias He wrote: On Thu, Mar 28, 2013 at 08:16:59AM +0200, Michael S. Tsirkin wrote: On Thu, Mar 28, 2013 at 10:17:28AM

Re: [PATCH V2 2/2] tcm_vhost: Use vq-private_data to indicate if the endpoint is setup

2013-03-28 Thread Michael S. Tsirkin
On Thu, Mar 28, 2013 at 04:10:02PM +0800, Asias He wrote: On Thu, Mar 28, 2013 at 08:16:59AM +0200, Michael S. Tsirkin wrote: On Thu, Mar 28, 2013 at 10:17:28AM +0800, Asias He wrote: Currently, vs-vs_endpoint is used indicate if the endpoint is setup or not. It is set or cleared in

Re: [PATCH V3 WIP 3/3] disable vhost_verify_ring_mappings check

2013-03-28 Thread Paolo Bonzini
Il 28/03/2013 10:04, Michael S. Tsirkin ha scritto: Got ranges_overlap for vq: 0 ring_phys: 0 ring_size: 1028 Checking vq: 1 ring_phys: 0 ring_size: 1028 . Got ranges_overlap for vq: 1 ring_phys: 0 ring_size: 1028 Checking vq: 2 ring_phys: ed000 ring_size: 5124 . Calling l: 5124 for

Re: [PATCH V3 WIP 3/3] disable vhost_verify_ring_mappings check

2013-03-28 Thread Paolo Bonzini
I think it's the right thing to do, but maybe not the right place to do this, need to reset after all IO is done, before ring memory is write protected. Our emails are crossing each other unfortunately, but I want to reinforce this: ring memory is not write protected. Remember that SeaBIOS

Re: [PATCH 3/4 v2] Rename EMULATE_DO_PAPR to EMULATE_EXIT_USER

2013-03-28 Thread Alexander Graf
On 21.03.2013, at 07:25, Bharat Bhushan wrote: From: Bharat Bhushan bharat.bhus...@freescale.com Instruction emulation return EMULATE_DO_PAPR when it requires exit to userspace on book3s. Similar return is required for booke. EMULATE_DO_PAPR reads out to be confusing so it is renamed to

KVM EPT implementation

2013-03-28 Thread Tony Roberts
Hello list, (Apologies if this appears twice!) I'm currently doing some research into guest memory allocation, specifically trying to determine when guests write data into certain memory locations, and I'm trying to get my head around how KVM updates the extended page tables, and where within

[RFC PATCH] pmu: prepare for migration support

2013-03-28 Thread Paolo Bonzini
In order to migrate the PMU state correctly, we need to restore the values of MSR_CORE_PERF_GLOBAL_STATUS (a read-only register) and MSR_CORE_PERF_GLOBAL_OVF_CTRL (which has side effects when written). We also need to write the full 40-bit value of the performance counter, which would only be

[PATCH] pmu: prepare for migration support

2013-03-28 Thread Paolo Bonzini
In order to migrate the PMU state correctly, we need to restore the values of MSR_CORE_PERF_GLOBAL_STATUS (a read-only register) and MSR_CORE_PERF_GLOBAL_OVF_CTRL (which has side effects when written). We also need to write the full 40-bit value of the performance counter, which would only be

Re: [PATCH 4/4 v2] KVM: PPC: Add userspace debug stub support

2013-03-28 Thread Alexander Graf
On 21.03.2013, at 07:25, Bharat Bhushan wrote: From: Bharat Bhushan bharat.bhus...@freescale.com This patch adds the debug stub support on booke/bookehv. Now QEMU debug stub can use hw breakpoint, watchpoint and software breakpoint to debug guest. Debug registers are saved/restored on

Re: [PATCH] tcm_vhost: Avoid VIRTIO_RING_F_EVENT_IDX feature bit

2013-03-28 Thread Michael S. Tsirkin
On Wed, Mar 27, 2013 at 11:25:02PM -0700, Nicholas A. Bellinger wrote: On Thu, 2013-03-28 at 08:04 +0200, Michael S. Tsirkin wrote: On Thu, Mar 28, 2013 at 12:27:10AM +, Nicholas A. Bellinger wrote: From: Nicholas Bellinger n...@linux-iscsi.org This patch adds a VHOST_TCM_FEATURES

Re: [PATCH] tcm_vhost: Avoid VIRTIO_RING_F_EVENT_IDX feature bit

2013-03-28 Thread Michael S. Tsirkin
On Wed, Mar 27, 2013 at 11:25:02PM -0700, Nicholas A. Bellinger wrote: On Thu, 2013-03-28 at 08:04 +0200, Michael S. Tsirkin wrote: On Thu, Mar 28, 2013 at 12:27:10AM +, Nicholas A. Bellinger wrote: From: Nicholas Bellinger n...@linux-iscsi.org This patch adds a VHOST_TCM_FEATURES

Re: [PATCH 2/3] vhost-scsi: new device supporting the tcm_vhost Linux kernel module

2013-03-28 Thread Michael S. Tsirkin
On Wed, Mar 27, 2013 at 11:28:56PM -0700, Nicholas A. Bellinger wrote: On Thu, 2013-03-28 at 08:19 +0200, Michael S. Tsirkin wrote: On Wed, Mar 27, 2013 at 04:24:22PM -0700, Nicholas A. Bellinger wrote: On Thu, 2013-03-28 at 00:53 +0200, Michael S. Tsirkin wrote: On Thu, Mar 28, 2013 at

[PATCH-v2] tcm_vhost: Avoid VIRTIO_RING_F_EVENT_IDX feature bit

2013-03-28 Thread Nicholas A. Bellinger
From: Nicholas Bellinger n...@linux-iscsi.org This patch adds a VHOST_SCSI_FEATURES mask minus VIRTIO_RING_F_EVENT_IDX so that vhost-scsi-pci userspace will strip this feature bit once GET_FEATURES reports it as being unsupported on the host. This is to avoid a bug where -handle_kicks() are

Re: [PATCH] tcm_vhost: Avoid VIRTIO_RING_F_EVENT_IDX feature bit

2013-03-28 Thread Nicholas A. Bellinger
On Thu, 2013-03-28 at 18:44 +0200, Michael S. Tsirkin wrote: On Wed, Mar 27, 2013 at 11:25:02PM -0700, Nicholas A. Bellinger wrote: On Thu, 2013-03-28 at 08:04 +0200, Michael S. Tsirkin wrote: On Thu, Mar 28, 2013 at 12:27:10AM +, Nicholas A. Bellinger wrote: From: Nicholas Bellinger

[PATCH-v2 0/2] Add support for vhost-scsi-pci

2013-03-28 Thread Nicholas A. Bellinger
From: Nicholas Bellinger n...@linux-iscsi.org Hi QEMU folks, The following is the patch-v2 series to support vhost-scsi-pci within the upstream QEMU tree. This includes the refactoring of existing virtio-scsi code from Paolo to allow a VirtIOSCSICommon structure that is shared amoungst existing

[PATCH-v2 2/2] vhost-scsi: new device supporting the tcm_vhost Linux kernel module

2013-03-28 Thread Nicholas A. Bellinger
From: Paolo Bonzini pbonz...@redhat.com The WWPN specified in configfs is passed to -device vhost-scsi-pci. The tgpt field of the SET_ENDPOINT ioctl is obsolete now, so it is not available from the QEMU command-line. Instead, I hardcode it to zero. Changes in Patch-v2: - Add

[PATCH-v2 1/2] virtio-scsi: create VirtIOSCSICommon

2013-03-28 Thread Nicholas A. Bellinger
From: Paolo Bonzini pbonz...@redhat.com This patch refactors existing virtio-scsi code into VirtIOSCSICommon in order to allow virtio_scsi_init_common() to be used by both internal virtio_scsi_init() and external vhost-scsi-pci code. Changes in Patch-v2: - Move -get_features() assignment to

Re: [PATCH 2/4 v2] KVM: PPC: debug stub interface parameter defined

2013-03-28 Thread Alexander Graf
On 21.03.2013, at 07:24, Bharat Bhushan wrote: From: Bharat Bhushan bharat.bhus...@freescale.com This patch defines the interface parameter for KVM_SET_GUEST_DEBUG ioctl support. Follow up patches will use this for setting up hardware breakpoints, watchpoints and software breakpoints.

Re: [PATCH 1/4 v2] Added ONE_REG interface for debug instruction

2013-03-28 Thread Alexander Graf
On 21.03.2013, at 07:24, Bharat Bhushan wrote: This patch adds the one_reg interface to get the special instruction to be used for setting software breakpoint from userspace. Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com Thanks, applied to kvm-ppc-queue. Alex -- To

RE: KVM EPT implementation

2013-03-28 Thread Zhang, Yang Z
Tony Roberts wrote on 2013-03-29: Hello list, (Apologies if this appears twice!) I'm currently doing some research into guest memory allocation, specifically trying to determine when guests write data into certain memory locations, and I'm trying to get my head around how KVM updates the

Re: [PATCH V3 WIP 3/3] disable vhost_verify_ring_mappings check

2013-03-28 Thread Nicholas A. Bellinger
On Thu, 2013-03-28 at 11:03 +0100, Paolo Bonzini wrote: Il 28/03/2013 10:04, Michael S. Tsirkin ha scritto: Got ranges_overlap for vq: 0 ring_phys: 0 ring_size: 1028 Checking vq: 1 ring_phys: 0 ring_size: 1028 . Got ranges_overlap for vq: 1 ring_phys: 0 ring_size: 1028 Checking

Re: [PATCH V3 WIP 3/3] disable vhost_verify_ring_mappings check

2013-03-28 Thread Nicholas A. Bellinger
On Thu, 2013-03-28 at 06:13 -0400, Paolo Bonzini wrote: I think it's the right thing to do, but maybe not the right place to do this, need to reset after all IO is done, before ring memory is write protected. Our emails are crossing each other unfortunately, but I want to reinforce this:

RE: [PATCH 2/4 v2] KVM: PPC: debug stub interface parameter defined

2013-03-28 Thread Bhushan Bharat-R65777
-Original Message- From: Alexander Graf [mailto:ag...@suse.de] Sent: Friday, March 29, 2013 7:26 AM To: Bhushan Bharat-R65777 Cc: kvm-...@vger.kernel.org; kvm@vger.kernel.org; Wood Scott-B07421; Bhushan Bharat-R65777 Subject: Re: [PATCH 2/4 v2] KVM: PPC: debug stub interface

RE: [PATCH v6 4/6] KVM: Add reset/restore rtc_status support

2013-03-28 Thread Zhang, Yang Z
Paolo Bonzini wrote on 2013-03-26: Il 22/03/2013 06:24, Yang Zhang ha scritto: +static void rtc_irq_restore(struct kvm_ioapic *ioapic) +{ +struct kvm_vcpu *vcpu; +int vector, i, pending_eoi = 0; + +if (RTC_GSI != 8) Please set it to -1U if not x86, and do if (RTC_GSI =

RE: [PATCH v6 4/6] KVM: Add reset/restore rtc_status support

2013-03-28 Thread Zhang, Yang Z
Paolo Bonzini wrote on 2013-03-26: Il 22/03/2013 06:24, Yang Zhang ha scritto: +vector = ioapic-redirtbl[RTC_GSI].fields.vector; +kvm_for_each_vcpu(i, vcpu, ioapic-kvm) { +if (kvm_apic_pending_eoi(vcpu, vector)) { +pending_eoi++; +

RE: [PATCH v6 6/6] KVM: Use eoi to track RTC interrupt delivery status

2013-03-28 Thread Zhang, Yang Z
Paolo Bonzini wrote on 2013-03-26: Il 22/03/2013 06:24, Yang Zhang ha scritto: +static void rtc_irq_ack_eoi(struct kvm_vcpu *vcpu, +struct rtc_status *rtc_status, int irq) +{ +if (irq != RTC_GSI) +return; + +if (test_and_clear_bit(vcpu-vcpu_id,

Re: [PATCH V3 WIP 3/3] disable vhost_verify_ring_mappings check

2013-03-28 Thread Nicholas A. Bellinger
On Thu, 2013-03-28 at 11:04 +0200, Michael S. Tsirkin wrote: On Thu, Mar 28, 2013 at 12:35:42AM -0700, Nicholas A. Bellinger wrote: On Wed, 2013-03-27 at 23:45 -0700, Nicholas A. Bellinger wrote: On Wed, 2013-03-27 at 15:33 -0700, Nicholas A. Bellinger wrote: On Wed, 2013-03-27 at 23:56

[PATCH] KVM: Allow cross page reads and writes from cached translations

2013-03-28 Thread Andrew Honig
This patch adds support for kvm_gfn_to_hva_cache_init functions for reads and writes that will cross a page. If the range falls within the same memslot, then this will be a fast operation. If the range is split between two memslots, then the slower kvm_read_guest and kvm_write_guest are used.

[PATCH uq/master v2 0/2] Add some tracepoints for clarification of the cause of troubles

2013-03-28 Thread Kazuya Saito
This series adds tracepoints for helping us clarify the cause of troubles. Virtualization on Linux is composed of some components such as qemu, kvm, libvirt, and so on. So it is very important to clarify firstly and swiftly the cause of troubles is on what component of them. Although qemu has

[PATCH uq/master v2 1/2] kvm-all: add kvm_ioctl, kvm_vm_ioctl, kvm_vcpu_ioctl tracepoints

2013-03-28 Thread Kazuya Saito
This patch adds tracepoints at ioctl to kvm. Tracing these ioctl is useful for clarification whether the cause of troubles is qemu or kvm. Signed-off-by: Kazuya Saito saito.kaz...@jp.fujitsu.com --- kvm-all.c|4 trace-events |5 + 2 files changed, 9 insertions(+), 0

[PATCH uq/master v2 2/2] kvm-all: add kvm_run_exit tracepoint

2013-03-28 Thread Kazuya Saito
This patch enable us to know exit reason of KVM_RUN. It will help us know where the trouble is caused. Signed-off-by: Kazuya Saito saito.kaz...@jp.fujitsu.com --- kvm-all.c|1 + trace-events |2 ++ 2 files changed, 3 insertions(+), 0 deletions(-) diff --git a/kvm-all.c b/kvm-all.c

[PATCH 0/3] virtio/vhost: Add checks for uninitialized VQs

2013-03-28 Thread Nicholas A. Bellinger
From: Nicholas Bellinger n...@linux-iscsi.org Hi folks, This series adds a virtio_queue_valid() for use by virtio-pci code in order to prevent opreations upon uninitialized VQs, that is currently expected to occur during seabios setup of virtio-scsi. This also includes a vhost specific check

[PATCH 1/3] virtio: add API to check that ring is setup

2013-03-28 Thread Nicholas A. Bellinger
From: Michael S. Tsirkin m...@redhat.com virtio scsi makes it legal to only setup a subset of rings. The only way to detect the ring is setup seems to be to check whether PA was written to. Add API to do this, and teach code to use it instead of checking hardware queue size. (nab: use

[PATCH 3/3] vhost: Check+skip uninitialized VQs in vhost_verify_ring_mappings

2013-03-28 Thread Nicholas A. Bellinger
From: Nicholas Bellinger n...@linux-iscsi.org With the virtio_queue_valid() checks in place to skip uninitialized VQs within virtio-pci code, go ahead and skip the same uninitialized VQs during vhost_verify_ring_mappings(). Note this patch does not prevent vhost_virtqueue_start() from executing

[PATCH 2/3] virtio-pci: Add virtio_queue_valid checks ahead of virtio_queue_get_num

2013-03-28 Thread Nicholas A. Bellinger
From: Nicholas Bellinger n...@linux-iscsi.org This patch adds a number of virtio_queue_valid() checks to virtio-pci ahead of virtio_queue_get_num() usage in order to skip operation upon the detection of an uninitialized VQ. There is one exception in virtio_ioport_read():VIRTIO_PCI_QUEUE_NUM,

[PATCH] Revert KVM: MMU: Move kvm_mmu_free_some_pages() into kvm_mmu_alloc_page()

2013-03-28 Thread Takuya Yoshikawa
With the following commit, shadow pages can be zapped at random during a shadow page talbe walk: KVM: MMU: Move kvm_mmu_free_some_pages() into kvm_mmu_alloc_page() 7ddca7e43c8f28f9419da81a0e7730b66aa60fe9 This patch reverts it and fixes __direct_map() and FNAME(fetch)(). Signed-off-by:

Re: [PATCH 3/4 v2] Rename EMULATE_DO_PAPR to EMULATE_EXIT_USER

2013-03-28 Thread Alexander Graf
On 21.03.2013, at 07:25, Bharat Bhushan wrote: From: Bharat Bhushan bharat.bhus...@freescale.com Instruction emulation return EMULATE_DO_PAPR when it requires exit to userspace on book3s. Similar return is required for booke. EMULATE_DO_PAPR reads out to be confusing so it is renamed to

Re: [PATCH 4/4 v2] KVM: PPC: Add userspace debug stub support

2013-03-28 Thread Alexander Graf
On 21.03.2013, at 07:25, Bharat Bhushan wrote: From: Bharat Bhushan bharat.bhus...@freescale.com This patch adds the debug stub support on booke/bookehv. Now QEMU debug stub can use hw breakpoint, watchpoint and software breakpoint to debug guest. Debug registers are saved/restored on

Re: [PATCH 2/4 v2] KVM: PPC: debug stub interface parameter defined

2013-03-28 Thread Alexander Graf
On 21.03.2013, at 07:24, Bharat Bhushan wrote: From: Bharat Bhushan bharat.bhus...@freescale.com This patch defines the interface parameter for KVM_SET_GUEST_DEBUG ioctl support. Follow up patches will use this for setting up hardware breakpoints, watchpoints and software breakpoints.

Re: [PATCH 1/4 v2] Added ONE_REG interface for debug instruction

2013-03-28 Thread Alexander Graf
On 21.03.2013, at 07:24, Bharat Bhushan wrote: This patch adds the one_reg interface to get the special instruction to be used for setting software breakpoint from userspace. Signed-off-by: Bharat Bhushan bharat.bhus...@freescale.com Thanks, applied to kvm-ppc-queue. Alex -- To

RE: [PATCH 2/4 v2] KVM: PPC: debug stub interface parameter defined

2013-03-28 Thread Bhushan Bharat-R65777
-Original Message- From: Alexander Graf [mailto:ag...@suse.de] Sent: Friday, March 29, 2013 7:26 AM To: Bhushan Bharat-R65777 Cc: kvm-ppc@vger.kernel.org; k...@vger.kernel.org; Wood Scott-B07421; Bhushan Bharat-R65777 Subject: Re: [PATCH 2/4 v2] KVM: PPC: debug stub interface