]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
KVM: selftests: Remove the unused argument to prepare_eptp()
authorYosry Ahmed <yosry.ahmed@linux.dev>
Tue, 21 Oct 2025 07:47:22 +0000 (07:47 +0000)
committerSean Christopherson <seanjc@google.com>
Fri, 21 Nov 2025 00:19:57 +0000 (16:19 -0800)
eptp_memslot is unused, remove it. No functional change intended.

Signed-off-by: Yosry Ahmed <yosry.ahmed@linux.dev>
Link: https://patch.msgid.link/20251021074736.1324328-10-yosry.ahmed@linux.dev
Signed-off-by: Sean Christopherson <seanjc@google.com>
tools/testing/selftests/kvm/include/x86/vmx.h
tools/testing/selftests/kvm/lib/x86/memstress.c
tools/testing/selftests/kvm/lib/x86/vmx.c
tools/testing/selftests/kvm/x86/vmx_dirty_log_test.c

index edb3c391b9824c914d1e6c7cd5ca2709a4fd384d..96e2b4c630a9baa4dcb517ee40e7f80fb1b6d8c2 100644 (file)
@@ -568,8 +568,7 @@ void nested_map_memslot(struct vmx_pages *vmx, struct kvm_vm *vm,
 void nested_identity_map_1g(struct vmx_pages *vmx, struct kvm_vm *vm,
                            uint64_t addr, uint64_t size);
 bool kvm_cpu_has_ept(void);
-void prepare_eptp(struct vmx_pages *vmx, struct kvm_vm *vm,
-                 uint32_t eptp_memslot);
+void prepare_eptp(struct vmx_pages *vmx, struct kvm_vm *vm);
 void prepare_virtualize_apic_accesses(struct vmx_pages *vmx, struct kvm_vm *vm);
 
 #endif /* SELFTEST_KVM_VMX_H */
index 7f5d62a65c68ad96c76443fe6fd0934b409ae5fc..0b1f288ad5564c9ae947311356766cb65820d135 100644 (file)
@@ -63,7 +63,7 @@ void memstress_setup_ept(struct vmx_pages *vmx, struct kvm_vm *vm)
 {
        uint64_t start, end;
 
-       prepare_eptp(vmx, vm, 0);
+       prepare_eptp(vmx, vm);
 
        /*
         * Identity map the first 4G and the test region with 1G pages so that
index d4d1208dd0238b6b0061c9d3fc105606e69626c2..9906456af11f4cc325d0a520061c4e94feaad915 100644 (file)
@@ -534,8 +534,7 @@ bool kvm_cpu_has_ept(void)
        return ctrl & SECONDARY_EXEC_ENABLE_EPT;
 }
 
-void prepare_eptp(struct vmx_pages *vmx, struct kvm_vm *vm,
-                 uint32_t eptp_memslot)
+void prepare_eptp(struct vmx_pages *vmx, struct kvm_vm *vm)
 {
        TEST_ASSERT(kvm_cpu_has_ept(), "KVM doesn't support nested EPT");
 
index 34a57fe747f64a4ca0674f481e8e75d9e12a5936..98cb6bdab3e6dbc174a42cb3d5f944b423f11294 100644 (file)
@@ -120,7 +120,7 @@ static void test_vmx_dirty_log(bool enable_ept)
         * GPAs as the EPT enabled case.
         */
        if (enable_ept) {
-               prepare_eptp(vmx, vm, 0);
+               prepare_eptp(vmx, vm);
                nested_map_memslot(vmx, vm, 0);
                nested_map(vmx, vm, NESTED_TEST_MEM1, GUEST_TEST_MEM, PAGE_SIZE);
                nested_map(vmx, vm, NESTED_TEST_MEM2, GUEST_TEST_MEM, PAGE_SIZE);