On Thu, Feb 4, 2016 at 5:27 AM, Razvan Cojocaru <rcojoc...@bitdefender.com> wrote:
> Currently, after receiving a vm_event reply requesting emulation, > the actual emulation is triggered in p2m_mem_access_check(), > which means that we're waiting for the page fault to occur again > before emulating. Aside from the performance impact, this > complicates the code since between hvm_do_resume() and the second > page fault it is possible that the latter becomes a completely > new page fault - hence checking that EIP and the GPA match with > the ones in the original page fault. If they don't, duplicate > EPT fault vm_events will occur, of which a monitoring application > needs to be aware. > This patch makes struct arch_vm_event smaller (since we no longer > need to track eip and gpa), removes the checking code from > p2m_mem_access_check(), and moves the emulation in hvm_do_resume(). > > Signed-off-by: Razvan Cojocaru <rcojoc...@bitdefender.com> > Acked-by: Tamas K Lengyel <ta...@tklengyel.com>
_______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel