diff options
| author | Joerg Roedel <joerg.roedel@amd.com> | 2011-04-04 14:39:24 +0400 |
|---|---|---|
| committer | Avi Kivity <avi@redhat.com> | 2011-05-11 15:57:00 +0400 |
| commit | 775fde8648ebc588d07de39457aadc7c2131df2e (patch) | |
| tree | 56706d5d6eff4b5f02c911cbbbcf3b14648aee69 /tools/perf/scripts/python | |
| parent | 3c6e276f22cf29188035535127c4c35aeeafcabc (diff) | |
| download | linux-775fde8648ebc588d07de39457aadc7c2131df2e.tar.xz | |
KVM: x86 emulator: Don't write-back cpu-state on X86EMUL_INTERCEPTED
This patch prevents the changed CPU state to be written back
when the emulator detected that the instruction was
intercepted by the guest.
Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
Diffstat (limited to 'tools/perf/scripts/python')
0 files changed, 0 insertions, 0 deletions
