Patch 1&2 are well-known, but I think no longer disputed. Patch 3 was requested by Avi while merging some qemu-kvm bits of mine, it should be pushed into 2.6.33 as well. And the other patches came out of my attempt to step over some APIC MMIO access of a guest. So far my "stable" bits, the rest is currently waiting for feedback by CPU vendors (NMI stepping on AMD, NMI injection vs. STI shadow on Intel). You may pull these patches from git://git.kiszka.org/linux-kvm gdb Jan Kiszka (6): KVM: VMX: Update instruction length on intercepted BP KVM: SVM: Emulate nRIP feature when reinjecting INT3 KVM: x86: Add KVM_CAP_X86_ROBUST_SINGLESTEP KVM: x86: Drop RF manipulation for guest single-stepping KVM: x86: Preserve injected TF across emulation KVM: x86: Emulator support for TF arch/x86/include/asm/kvm_host.h | 5 +++ arch/x86/kvm/svm.c | 72 +++++++++++++++++++++++++++---------- arch/x86/kvm/vmx.c | 19 ++++++++++ arch/x86/kvm/x86.c | 74 ++++++++++++++++++++++++++++++++------ include/linux/kvm.h | 1 + 5 files changed, 139 insertions(+), 32 deletions(-) -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html