Re: [Xen-devel] [PATCH v3 13/24] x86/emul: Rework emulator event injection

2016-12-01 Thread Jan Beulich
>>> On 30.11.16 at 14:50, wrote: > The emulator needs to gain an understanding of interrupts and exceptions > generated by its actions. > > Move hvm_emulate_ctxt.{exn_pending,trap} into struct x86_emulate_ctxt so they > are visible to the emulator. This removes the

Re: [Xen-devel] [PATCH v3 13/24] x86/emul: Rework emulator event injection

2016-12-01 Thread Tim Deegan
At 13:50 + on 30 Nov (1480513830), Andrew Cooper wrote: > The emulator needs to gain an understanding of interrupts and exceptions > generated by its actions. > > Move hvm_emulate_ctxt.{exn_pending,trap} into struct x86_emulate_ctxt so they > are visible to the emulator. This removes the

Re: [Xen-devel] [PATCH v3 13/24] x86/emul: Rework emulator event injection

2016-11-30 Thread Paul Durrant
> -Original Message- > From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: 30 November 2016 13:51 > To: Xen-devel > Cc: Andrew Cooper ; Jan Beulich > ; Paul Durrant ; Tim > (Xen.org)

[Xen-devel] [PATCH v3 13/24] x86/emul: Rework emulator event injection

2016-11-30 Thread Andrew Cooper
The emulator needs to gain an understanding of interrupts and exceptions generated by its actions. Move hvm_emulate_ctxt.{exn_pending,trap} into struct x86_emulate_ctxt so they are visible to the emulator. This removes the need for the inject_{hw_exception,sw_interrupt}() hooks, which are