Skip to content

Commit e533567

Browse files
committed
kvm-ioctls: Enable VmFd enable_cap for all architectures
Disable conditional compilation of enable_cap for VmFd, making it available on all architectures Signed-off-by: David Kleymann <[email protected]>
1 parent ec0da8b commit e533567

File tree

2 files changed

+4
-1
lines changed

2 files changed

+4
-1
lines changed

kvm-ioctls/CHANGELOG.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,10 @@
22

33
## Upcoming Release
44

5+
### Fixed
6+
7+
- Fixed `VmFd::enable_cap` available for all architectures
8+
59
### Added
610

711
- Added `KvmDirtyLogRing` structure to mmap the dirty log ring.

kvm-ioctls/src/ioctls/vm.rs

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1404,7 +1404,6 @@ impl VmFd {
14041404
/// cap.args[0] = 24;
14051405
/// vm.enable_cap(&cap).unwrap();
14061406
/// ```
1407-
#[cfg(any(target_arch = "x86_64", target_arch = "s390x", target_arch = "powerpc"))]
14081407
pub fn enable_cap(&self, cap: &kvm_enable_cap) -> Result<()> {
14091408
// SAFETY: The ioctl is safe because we allocated the struct and we know the
14101409
// kernel will write exactly the size of the struct.

0 commit comments

Comments
 (0)