|
@@ -103,7 +103,7 @@ void kvm_arm_reset_debug_ptr(struct kvm_vcpu *vcpu)
|
|
|
*
|
|
|
* Additionally, KVM only traps guest accesses to the debug registers if
|
|
|
* the guest is not actively using them (see the KVM_ARM64_DEBUG_DIRTY
|
|
|
- * flag on vcpu->arch.debug_flags). Since the guest must not interfere
|
|
|
+ * flag on vcpu->arch.flags). Since the guest must not interfere
|
|
|
* with the hardware state when debugging the guest, we must ensure that
|
|
|
* trapping is enabled whenever we are debugging the guest using the
|
|
|
* debug registers.
|
|
@@ -111,7 +111,7 @@ void kvm_arm_reset_debug_ptr(struct kvm_vcpu *vcpu)
|
|
|
|
|
|
void kvm_arm_setup_debug(struct kvm_vcpu *vcpu)
|
|
|
{
|
|
|
- bool trap_debug = !(vcpu->arch.debug_flags & KVM_ARM64_DEBUG_DIRTY);
|
|
|
+ bool trap_debug = !(vcpu->arch.flags & KVM_ARM64_DEBUG_DIRTY);
|
|
|
unsigned long mdscr;
|
|
|
|
|
|
trace_kvm_arm_setup_debug(vcpu, vcpu->guest_debug);
|
|
@@ -184,7 +184,7 @@ void kvm_arm_setup_debug(struct kvm_vcpu *vcpu)
|
|
|
vcpu_write_sys_reg(vcpu, mdscr, MDSCR_EL1);
|
|
|
|
|
|
vcpu->arch.debug_ptr = &vcpu->arch.external_debug_state;
|
|
|
- vcpu->arch.debug_flags |= KVM_ARM64_DEBUG_DIRTY;
|
|
|
+ vcpu->arch.flags |= KVM_ARM64_DEBUG_DIRTY;
|
|
|
trap_debug = true;
|
|
|
|
|
|
trace_kvm_arm_set_regset("BKPTS", get_num_brps(),
|
|
@@ -206,7 +206,7 @@ void kvm_arm_setup_debug(struct kvm_vcpu *vcpu)
|
|
|
|
|
|
/* If KDE or MDE are set, perform a full save/restore cycle. */
|
|
|
if (vcpu_read_sys_reg(vcpu, MDSCR_EL1) & (DBG_MDSCR_KDE | DBG_MDSCR_MDE))
|
|
|
- vcpu->arch.debug_flags |= KVM_ARM64_DEBUG_DIRTY;
|
|
|
+ vcpu->arch.flags |= KVM_ARM64_DEBUG_DIRTY;
|
|
|
|
|
|
trace_kvm_arm_set_dreg32("MDCR_EL2", vcpu->arch.mdcr_el2);
|
|
|
trace_kvm_arm_set_dreg32("MDSCR_EL1", vcpu_read_sys_reg(vcpu, MDSCR_EL1));
|