Revision 496063426dece3f47e21f9f3387205d6ca03bd2a authored by Dave Jones on 14 October 2016, 18:26:24 UTC, committed by Linus Torvalds on 14 October 2016, 18:36:59 UTC
This easy-to-trigger warning shows up instantly when running Trinity on a kernel with CONFIG_X86_INTEL_MEMORY_PROTECTION_KEYS disabled. At most this should have been a printk, but the -EINVAL alone should be more than adequate indicator that something isn't available. Signed-off-by: Dave Jones <davej@codemonkey.org.uk> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
1 parent e9f8f48
kvm_para.h
#ifndef _ASM_GENERIC_KVM_PARA_H
#define _ASM_GENERIC_KVM_PARA_H
#include <uapi/asm-generic/kvm_para.h>
/*
* This function is used by architectures that support kvm to avoid issuing
* false soft lockup messages.
*/
static inline bool kvm_check_and_clear_guest_paused(void)
{
return false;
}
static inline unsigned int kvm_arch_para_features(void)
{
return 0;
}
static inline bool kvm_para_available(void)
{
return false;
}
#endif
Computing file changes ...