[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v7 06/14] arm/mem_access: Introduce GV2M_EXEC permission
We extend the current implementation by an additional permission, GV2M_EXEC, which will be used to describe execute permissions of PTE's as part of our guest translation table walk implementation. Signed-off-by: Sergej Proskurin <proskurin@xxxxxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxx> --- Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx> Cc: Julien Grall <julien.grall@xxxxxxx> --- xen/include/asm-arm/page.h | 1 + 1 file changed, 1 insertion(+) diff --git a/xen/include/asm-arm/page.h b/xen/include/asm-arm/page.h index cef2f28914..b8d641bfaf 100644 --- a/xen/include/asm-arm/page.h +++ b/xen/include/asm-arm/page.h @@ -90,6 +90,7 @@ /* Flags for get_page_from_gva, gvirt_to_maddr etc */ #define GV2M_READ (0u<<0) #define GV2M_WRITE (1u<<0) +#define GV2M_EXEC (1u<<1) #ifndef __ASSEMBLY__ -- 2.13.2 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |