diff options
| author | Mathias Krause <minipli@grsecurity.net> | 2023-03-22 02:37:30 +0100 |
|---|---|---|
| committer | Sean Christopherson <seanjc@google.com> | 2023-03-22 07:46:53 -0700 |
| commit | 50f13998451effea5c5fdc70fe576f8b435d6224 (patch) | |
| tree | bbc818882b5de4bf92833751b04ff1badf262fdd | |
| parent | 2fdcc1b324189b5fb20655baebd40cd82e2bdf0c (diff) | |
KVM: x86/mmu: Fix comment typo
Fix a small comment typo in make_spte().
Signed-off-by: Mathias Krause <minipli@grsecurity.net>
Link: https://lore.kernel.org/r/20230322013731.102955-6-minipli@grsecurity.net
Signed-off-by: Sean Christopherson <seanjc@google.com>
| -rw-r--r-- | arch/x86/kvm/mmu/spte.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/x86/kvm/mmu/spte.c b/arch/x86/kvm/mmu/spte.c index c15bfca3ed15..cf2c6426a6fc 100644 --- a/arch/x86/kvm/mmu/spte.c +++ b/arch/x86/kvm/mmu/spte.c @@ -164,7 +164,7 @@ bool make_spte(struct kvm_vcpu *vcpu, struct kvm_mmu_page *sp, /* * For simplicity, enforce the NX huge page mitigation even if not * strictly necessary. KVM could ignore the mitigation if paging is - * disabled in the guest, as the guest doesn't have an page tables to + * disabled in the guest, as the guest doesn't have any page tables to * abuse. But to safely ignore the mitigation, KVM would have to * ensure a new MMU is loaded (or all shadow pages zapped) when CR0.PG * is toggled on, and that's a net negative for performance when TDP is |
