diff options
| author | Avi Kivity <[email protected]> | 2010-11-17 15:28:21 +0200 |
|---|---|---|
| committer | Avi Kivity <[email protected]> | 2011-01-12 11:29:35 +0200 |
| commit | 90de84f50b425805bf7ddc430143ed2e224ebd8e (patch) | |
| tree | 259b70846fc9972c77e60c85e0afe172b4d87d7d /tools/perf/scripts/python/syscall-counts-by-pid.py | |
| parent | d53db5efc2f6026f7cb0871c91b887ed55e0f265 (diff) | |
KVM: x86 emulator: preserve an operand's segment identity
Currently the x86 emulator converts the segment register associated with
an operand into a segment base which is added into the operand address.
This loss of information results in us not doing segment limit checks properly.
Replace struct operand's addr.mem field by a segmented_address structure
which holds both the effetive address and segment. This will allow us to
do the limit check at the point of access.
Signed-off-by: Avi Kivity <[email protected]>
Signed-off-by: Marcelo Tosatti <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts-by-pid.py')
0 files changed, 0 insertions, 0 deletions