aboutsummaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/export-to-postgresql.py
diff options
context:
space:
mode:
authorDavid Hildenbrand <[email protected]>2016-06-13 10:49:04 +0200
committerChristian Borntraeger <[email protected]>2016-06-20 09:55:20 +0200
commit01f719176f28016da1b588f6560a4eef18a98a93 (patch)
tree1ce75d8a85c078e46bd23733cf7fc098dc21b8dd /tools/perf/scripts/python/export-to-postgresql.py
parent5b6c963bcef5c3a857e3f8ba84aa9380069fc95f (diff)
s390/mm: don't fault everything in read-write in gmap_pte_op_fixup()
Let's not fault in everything in read-write but limit it to read-only where possible. When restricting access rights, we already have the required protection level in our hands. When reading from guest 2 storage (gmap_read_table), it is obviously PROT_READ. When shadowing a pte, the required protection level is given via the guest 2 provided pte. Based on an initial patch by Martin Schwidefsky. Acked-by: Martin Schwidefsky <[email protected]> Signed-off-by: David Hildenbrand <[email protected]> Signed-off-by: Christian Borntraeger <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/export-to-postgresql.py')
0 files changed, 0 insertions, 0 deletions