Star64_linux/arch/x86/kvm/mmu
Paolo Bonzini 4ac214574d KVM: MMU: mark role_regs and role accessors as maybe unused
It is reasonable for these functions to be used only in some configurations,
for example only if the host is 64-bits (and therefore supports 64-bit
guests).  It is also reasonable to keep the role_regs and role accessors
in sync even though some of the accessors may be used only for one of the
two sets (as is the case currently for CR4.LA57)..

Because clang reports warnings for unused inlines declared in a .c file,
mark both sets of accessors as __maybe_unused.

Reported-by: kernel test robot <lkp@intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2021-09-06 06:56:38 -04:00
..
mmu.c KVM: MMU: mark role_regs and role accessors as maybe unused 2021-09-06 06:56:38 -04:00
mmu_audit.c KVM: x86/mmu: Rename __gfn_to_rmap to gfn_to_rmap 2021-08-06 07:52:58 -04:00
mmu_internal.h KVM: x86/mmu: Move lpage_disallowed_link further "down" in kvm_mmu_page 2021-09-06 06:20:05 -04:00
mmutrace.h KVM: x86/mmu: Fix use of enums in trace_fast_page_fault 2021-08-02 11:01:47 -04:00
page_track.c KVM: X86: Introduce kvm_mmu_slot_lpages() helpers 2021-08-20 16:04:51 -04:00
paging.h KVM: x86/mmu: Do not apply HPA (memory encryption) mask to GPAs 2021-07-14 12:17:56 -04:00
paging_tmpl.h KVM: x86/mmu: allow kvm_faultin_pfn to return page fault handling code 2021-08-20 16:06:20 -04:00
spte.c KVM: x86/mmu: WARN on any reserved SPTE value when making a valid SPTE 2021-06-24 18:00:46 -04:00
spte.h KVM: x86/mmu: Do not apply HPA (memory encryption) mask to GPAs 2021-07-14 12:17:56 -04:00
tdp_iter.c KVM: x86/mmu: Store the address space ID in the TDP iterator 2021-03-16 14:16:34 -04:00
tdp_iter.h KVM: x86/mmu: Store the address space ID in the TDP iterator 2021-03-16 14:16:34 -04:00
tdp_mmu.c KVM: x86/mmu: Drop 'shared' param from tdp_mmu_link_page() 2021-08-20 16:06:35 -04:00
tdp_mmu.h Revert "KVM: x86/mmu: Allow zap gfn range to operate under the mmu read lock" 2021-08-20 16:06:15 -04:00