[COMMIT master] KVM: PPC: Memset vcpu to zeros

2010-02-24 Thread Avi Kivity
From: Alexander Graf a...@csgraf.de While converting the kzalloc we used to allocate our vcpu struct to vmalloc, I forgot to memset the contents to zeros. That broke quite a lot. This patch memsets it to zero again. Signed-off-by: Alexander Graf a...@csgraf.de Signed-off-by: Avi Kivity

[COMMIT master] KVM: PPC: Destory timer on vcpu destruction

2010-02-24 Thread Avi Kivity
From: Alexander Graf a...@csgraf.de When we destory a vcpu, we should also make sure to kill all pending timers that could still be up. When not doing this, hrtimers might dereference null pointers trying to call our code. This patch fixes spontanious kernel panics seen after closing VMs.

[COMMIT master] KVM: VMX: Update instruction length on intercepted BP

2010-02-24 Thread Avi Kivity
From: Jan Kiszka jan.kis...@siemens.com We intercept #BP while in guest debugging mode. As VM exits due to intercepted exceptions do not necessarily come with valid idt_vectoring, we have to update event_exit_inst_len explicitly in such cases. At least in the absence of migration, this ensures

[COMMIT master] KVM: x86: Kick VCPU outside PIC lock again

2010-02-24 Thread Avi Kivity
From: Jan Kiszka jan.kis...@siemens.com This restores the deferred VCPU kicking before 956f97cf. We need this over -rt as wake_up* requires non-atomic context in this configuration. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Avi Kivity a...@redhat.com diff --git

[COMMIT master] KVM: x86: Drop RF manipulation for guest single-stepping

2010-02-24 Thread Avi Kivity
From: Jan Kiszka jan.kis...@siemens.com RF is not required for injecting TF as the latter will trigger only after an instruction execution anyway. So do not touch RF when arming or disarming guest single-step mode. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Avi Kivity

[COMMIT master] KVM: SVM: Emulate nRIP feature when reinjecting INT3

2010-02-24 Thread Avi Kivity
From: Jan Kiszka jan.kis...@siemens.com When in guest debugging mode, we have to reinject those #BP software exceptions that are caused by guest-injected INT3. As older AMD processors do not support the required nRIP VMCB field, try to emulate it by moving RIP past the instruction on exception

[COMMIT master] KVM: x86: Add kvm_is_linear_rip

2010-02-24 Thread Avi Kivity
From: Jan Kiszka jan.kis...@siemens.com Based on Gleb's suggestion: Add a helper kvm_is_linear_rip that matches a given linear RIP against the current one. Use this for guest single-stepping, more users will follow. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Avi Kivity

[COMMIT master] KVM: x86: Add KVM_CAP_X86_ROBUST_SINGLESTEP

2010-02-24 Thread Avi Kivity
From: Jan Kiszka jan.kis...@siemens.com This marks the guest single-step API improvement of 94fe45da and 91586a3b with a capability flag to allow reliable detection by user space. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Cc: sta...@kernel.org (2.6.33) Signed-off-by: Avi Kivity

[COMMIT master] KVM: x86: Preserve injected TF across emulation

2010-02-24 Thread Avi Kivity
From: Jan Kiszka jan.kis...@siemens.com Call directly into the vendor services for getting/setting rflags in emulate_instruction to ensure injected TF survives the emulation. Signed-off-by: Jan Kiszka jan.kis...@siemens.com Signed-off-by: Avi Kivity a...@redhat.com diff --git