diff options
| author | Paolo Bonzini <[email protected]> | 2020-03-25 12:50:03 -0400 |
|---|---|---|
| committer | Paolo Bonzini <[email protected]> | 2020-04-20 17:26:05 -0400 |
| commit | 0cd665bd20f9088d363158b4ac75592af18ecf4f (patch) | |
| tree | c6c950d8a402dc074e9edd19ecb3d512d28cc1cf /tools/perf/scripts/python/event_analyzing_sample.py | |
| parent | 5efac0741ce238e0844d3f7af00198f81e84926a (diff) | |
KVM: x86: cleanup kvm_inject_emulated_page_fault
To reconstruct the kvm_mmu to be used for page fault injection, we
can simply use fault->nested_page_fault. This matches how
fault->nested_page_fault is assigned in the first place by
FNAME(walk_addr_generic).
Signed-off-by: Paolo Bonzini <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/event_analyzing_sample.py')
0 files changed, 0 insertions, 0 deletions