From b0b1d69079fcb9453f45aade9e9f6b71422147b0 Mon Sep 17 00:00:00 2001 From: Jan Kiszka Date: Mon, 1 Mar 2010 19:10:29 +0100 Subject: KVM: Rework of guest debug state writing So far we synchronized any dirty VCPU state back into the kernel before updating the guest debug state. This was a tribute to a deficite in x86 kernels before 2.6.33. But as this is an arch-dependent issue, it is better handle in the x86 part of KVM and remove the writeback point for generic code. This also avoids overwriting the flushed state later on if user space decides to change some more registers before resuming the guest. We furthermore need to reinject guest exceptions via the appropriate mechanism. That is KVM_SET_GUEST_DEBUG for older kernels and KVM_SET_VCPU_EVENTS for recent ones. Using both mechanisms at the same time will cause state corruptions. Signed-off-by: Jan Kiszka Signed-off-by: Marcelo Tosatti --- kvm.h | 1 + 1 file changed, 1 insertion(+) (limited to 'kvm.h') diff --git a/kvm.h b/kvm.h index a74dfcb083..a602e4552a 100644 --- a/kvm.h +++ b/kvm.h @@ -40,6 +40,7 @@ int kvm_log_stop(target_phys_addr_t phys_addr, ram_addr_t size); int kvm_has_sync_mmu(void); int kvm_has_vcpu_events(void); +int kvm_has_robust_singlestep(void); void kvm_setup_guest_memory(void *start, size_t size); -- cgit v1.2.1