diff options
| author | Jan Kiszka <jan.kiszka@siemens.com> | 2010-02-23 17:47:58 +0100 |
|---|---|---|
| committer | Avi Kivity <avi@redhat.com> | 2010-04-25 13:52:51 +0300 |
| commit | c310bac5a20fc37f761bd7297ba2e52cf40d79c6 (patch) | |
| tree | b5aed3e937691f8bf65857402535ece04ee47a58 /tools/perf/scripts/python/syscall-counts.py | |
| parent | 66b7138f913635b40822890ba8913548f8b285b8 (diff) | |
KVM: x86: Drop RF manipulation for guest single-stepping
RF is not required for injecting TF as the latter will trigger only
after an instruction execution anyway. So do not touch RF when arming or
disarming guest single-step mode.
Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts.py')
0 files changed, 0 insertions, 0 deletions
