diff options
| author | Ard Biesheuvel <[email protected]> | 2014-09-17 14:56:20 -0700 |
|---|---|---|
| committer | Christoffer Dall <[email protected]> | 2014-10-10 13:07:38 +0200 |
| commit | 4a513fb009b96cf3d86491e00565367ceec29073 (patch) | |
| tree | 12c481c56a63e0d0652087d73b668e1d104881dd /kernel/bpf/arraymap.c | |
| parent | 903ed3a54df2f6234c50f696b8a3db78c26ea119 (diff) | |
arm64: kvm: define PAGE_S2_DEVICE as read-only by default
Now that we support read-only memslots, we need to make sure that
pass-through device mappings are not mapped writable if the guest
has requested them to be read-only. The existing implementation
already honours this by calling kvm_set_s2pte_writable() on the new
pte in case of writable mappings, so all we need to do is define
the default pgprot_t value used for devices to be PTE_S2_RDONLY.
Acked-by: Marc Zyngier <[email protected]>
Signed-off-by: Ard Biesheuvel <[email protected]>
Signed-off-by: Christoffer Dall <[email protected]>
Diffstat (limited to 'kernel/bpf/arraymap.c')
0 files changed, 0 insertions, 0 deletions