diff options
author | Paolo Bonzini <pbonzini@redhat.com> | 2024-07-16 09:54:57 -0400 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2024-07-16 09:54:57 -0400 |
commit | 5c5ddf71071f01fabe9380e16c36c9263d40d528 (patch) | |
tree | b7693fc445cc7df841414f6ed6387f651d0b66f5 /arch/x86/kvm/x86.h | |
parent | 34b69edecb47284e81f0204a50db5e55fe93cb52 (diff) | |
parent | 377b2f359d1f71c75f8cc352b5c81f2210312d83 (diff) | |
download | linux-stable-5c5ddf71071f01fabe9380e16c36c9263d40d528.tar.gz linux-stable-5c5ddf71071f01fabe9380e16c36c9263d40d528.tar.bz2 linux-stable-5c5ddf71071f01fabe9380e16c36c9263d40d528.zip |
Merge tag 'kvm-x86-mtrrs-6.11' of https://github.com/kvm-x86/linux into HEAD
KVM x86 MTRR virtualization removal
Remove support for virtualizing MTRRs on Intel CPUs, along with a nasty CR0.CD
hack, and instead always honor guest PAT on CPUs that support self-snoop.
Diffstat (limited to 'arch/x86/kvm/x86.h')
-rw-r--r-- | arch/x86/kvm/x86.h | 4 |
1 files changed, 0 insertions, 4 deletions
diff --git a/arch/x86/kvm/x86.h b/arch/x86/kvm/x86.h index a88c65d3ea26..5da5b869a991 100644 --- a/arch/x86/kvm/x86.h +++ b/arch/x86/kvm/x86.h @@ -325,12 +325,8 @@ int handle_ud(struct kvm_vcpu *vcpu); void kvm_deliver_exception_payload(struct kvm_vcpu *vcpu, struct kvm_queued_exception *ex); -void kvm_vcpu_mtrr_init(struct kvm_vcpu *vcpu); -u8 kvm_mtrr_get_guest_memory_type(struct kvm_vcpu *vcpu, gfn_t gfn); int kvm_mtrr_set_msr(struct kvm_vcpu *vcpu, u32 msr, u64 data); int kvm_mtrr_get_msr(struct kvm_vcpu *vcpu, u32 msr, u64 *pdata); -bool kvm_mtrr_check_gfn_range_consistency(struct kvm_vcpu *vcpu, gfn_t gfn, - int page_num); bool kvm_vector_hashing_enabled(void); void kvm_fixup_and_inject_pf_error(struct kvm_vcpu *vcpu, gva_t gva, u16 error_code); int x86_decode_emulated_instruction(struct kvm_vcpu *vcpu, int emulation_type, |