aboutsummaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/syscall-counts-by-pid.py
diff options
context:
space:
mode:
authorAvi Kivity <[email protected]>2010-11-17 15:28:21 +0200
committerAvi Kivity <[email protected]>2011-01-12 11:29:35 +0200
commit90de84f50b425805bf7ddc430143ed2e224ebd8e (patch)
tree259b70846fc9972c77e60c85e0afe172b4d87d7d /tools/perf/scripts/python/syscall-counts-by-pid.py
parentd53db5efc2f6026f7cb0871c91b887ed55e0f265 (diff)
KVM: x86 emulator: preserve an operand's segment identity
Currently the x86 emulator converts the segment register associated with an operand into a segment base which is added into the operand address. This loss of information results in us not doing segment limit checks properly. Replace struct operand's addr.mem field by a segmented_address structure which holds both the effetive address and segment. This will allow us to do the limit check at the point of access. Signed-off-by: Avi Kivity <[email protected]> Signed-off-by: Marcelo Tosatti <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts-by-pid.py')
0 files changed, 0 insertions, 0 deletions