diff options
author | 2024-12-19 14:41:10 -0800 | |
---|---|---|
committer | 2024-12-20 09:01:25 +0000 | |
commit | 75a5fbaf6623328d3ac69719145c2247f7b4e299 (patch) | |
tree | b49242e944f26aef5b414294606fe405ca6822da /scripts/generate_rust_analyzer.py | |
parent | KVM: arm64: Reload vCPU for accesses to OSLAR_EL1 (diff) | |
download | wireguard-linux-75a5fbaf6623328d3ac69719145c2247f7b4e299.tar.xz wireguard-linux-75a5fbaf6623328d3ac69719145c2247f7b4e299.zip |
KVM: arm64: Compute MDCR_EL2 at vcpu_load()
KVM has picked up several hacks to cope with vcpu->arch.mdcr_el2 needing
to be prepared before vcpu_load(), which is when it gets programmed
into hardware on VHE.
Now that the flows for reprogramming MDCR_EL2 have been simplified, move
that computation to vcpu_load().
Tested-by: James Clark <james.clark@linaro.org>
Signed-off-by: Oliver Upton <oliver.upton@linux.dev>
Link: https://lore.kernel.org/r/20241219224116.3941496-14-oliver.upton@linux.dev
Signed-off-by: Marc Zyngier <maz@kernel.org>
Diffstat (limited to 'scripts/generate_rust_analyzer.py')
0 files changed, 0 insertions, 0 deletions