diff options
author | 2023-03-22 02:37:30 +0100 | |
---|---|---|
committer | 2023-03-22 07:46:53 -0700 | |
commit | 50f13998451effea5c5fdc70fe576f8b435d6224 (patch) | |
tree | bbc818882b5de4bf92833751b04ff1badf262fdd | |
parent | KVM: x86/mmu: Avoid indirect call for get_cr3 (diff) | |
download | linux-rng-50f13998451effea5c5fdc70fe576f8b435d6224.tar.xz linux-rng-50f13998451effea5c5fdc70fe576f8b435d6224.zip |
KVM: x86/mmu: Fix comment typo
Fix a small comment typo in make_spte().
Signed-off-by: Mathias Krause <minipli@grsecurity.net>
Link: https://lore.kernel.org/r/20230322013731.102955-6-minipli@grsecurity.net
Signed-off-by: Sean Christopherson <seanjc@google.com>
-rw-r--r-- | arch/x86/kvm/mmu/spte.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/x86/kvm/mmu/spte.c b/arch/x86/kvm/mmu/spte.c index c15bfca3ed15..cf2c6426a6fc 100644 --- a/arch/x86/kvm/mmu/spte.c +++ b/arch/x86/kvm/mmu/spte.c @@ -164,7 +164,7 @@ bool make_spte(struct kvm_vcpu *vcpu, struct kvm_mmu_page *sp, /* * For simplicity, enforce the NX huge page mitigation even if not * strictly necessary. KVM could ignore the mitigation if paging is - * disabled in the guest, as the guest doesn't have an page tables to + * disabled in the guest, as the guest doesn't have any page tables to * abuse. But to safely ignore the mitigation, KVM would have to * ensure a new MMU is loaded (or all shadow pages zapped) when CR0.PG * is toggled on, and that's a net negative for performance when TDP is |