diff options
author | 2022-02-10 07:30:31 -0500 | |
---|---|---|
committer | 2022-04-29 12:49:17 -0400 | |
commit | 39e7e2bf321ac7784823e61abcbdf1459aeaee94 (patch) | |
tree | 198eaf1a553d7ce15712a2b59b8d2ef19aa99c26 /tools/perf/scripts/python/event_analyzing_sample.py | |
parent | KVM: x86/mmu: constify uses of struct kvm_mmu_role_regs (diff) | |
download | linux-dev-39e7e2bf321ac7784823e61abcbdf1459aeaee94.tar.xz linux-dev-39e7e2bf321ac7784823e61abcbdf1459aeaee94.zip |
KVM: x86/mmu: pull computation of kvm_mmu_role_regs to kvm_init_mmu
The init_kvm_*mmu functions, with the exception of shadow NPT,
do not need to know the full values of CR0/CR4/EFER; they only
need to know the bits that make up the "role". This cleanup
however will take quite a few incremental steps. As a start,
pull the common computation of the struct kvm_mmu_role_regs
into their caller: all of them extract the struct from the vcpu
as the very first step.
Reviewed-by: David Matlack <dmatlack@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'tools/perf/scripts/python/event_analyzing_sample.py')
0 files changed, 0 insertions, 0 deletions