kvm: x86: mmu: Rename EPT_VIOLATION_READ/WRITE/INSTR constants
Rename the EPT_VIOLATION_READ/WRITE/INSTR constants to EPT_VIOLATION_ACC_READ/WRITE/INSTR to more clearly indicate that these signify the type of the memory access as opposed to the permissions granted by the PTE. Signed-off-by: Junaid Shahid <junaids@google.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
This commit is contained in:
Родитель
0b4c208d44
Коммит
ab22a4733f
|
@ -510,15 +510,15 @@ struct vmx_msr_entry {
|
|||
/*
|
||||
* Exit Qualifications for EPT Violations
|
||||
*/
|
||||
#define EPT_VIOLATION_READ_BIT 0
|
||||
#define EPT_VIOLATION_WRITE_BIT 1
|
||||
#define EPT_VIOLATION_INSTR_BIT 2
|
||||
#define EPT_VIOLATION_ACC_READ_BIT 0
|
||||
#define EPT_VIOLATION_ACC_WRITE_BIT 1
|
||||
#define EPT_VIOLATION_ACC_INSTR_BIT 2
|
||||
#define EPT_VIOLATION_READABLE_BIT 3
|
||||
#define EPT_VIOLATION_WRITABLE_BIT 4
|
||||
#define EPT_VIOLATION_EXECUTABLE_BIT 5
|
||||
#define EPT_VIOLATION_READ (1 << EPT_VIOLATION_READ_BIT)
|
||||
#define EPT_VIOLATION_WRITE (1 << EPT_VIOLATION_WRITE_BIT)
|
||||
#define EPT_VIOLATION_INSTR (1 << EPT_VIOLATION_INSTR_BIT)
|
||||
#define EPT_VIOLATION_ACC_READ (1 << EPT_VIOLATION_ACC_READ_BIT)
|
||||
#define EPT_VIOLATION_ACC_WRITE (1 << EPT_VIOLATION_ACC_WRITE_BIT)
|
||||
#define EPT_VIOLATION_ACC_INSTR (1 << EPT_VIOLATION_ACC_INSTR_BIT)
|
||||
#define EPT_VIOLATION_READABLE (1 << EPT_VIOLATION_READABLE_BIT)
|
||||
#define EPT_VIOLATION_WRITABLE (1 << EPT_VIOLATION_WRITABLE_BIT)
|
||||
#define EPT_VIOLATION_EXECUTABLE (1 << EPT_VIOLATION_EXECUTABLE_BIT)
|
||||
|
|
|
@ -6375,13 +6375,13 @@ static int handle_ept_violation(struct kvm_vcpu *vcpu)
|
|||
trace_kvm_page_fault(gpa, exit_qualification);
|
||||
|
||||
/* Is it a read fault? */
|
||||
error_code = (exit_qualification & EPT_VIOLATION_READ)
|
||||
error_code = (exit_qualification & EPT_VIOLATION_ACC_READ)
|
||||
? PFERR_USER_MASK : 0;
|
||||
/* Is it a write fault? */
|
||||
error_code |= (exit_qualification & EPT_VIOLATION_WRITE)
|
||||
error_code |= (exit_qualification & EPT_VIOLATION_ACC_WRITE)
|
||||
? PFERR_WRITE_MASK : 0;
|
||||
/* Is it a fetch fault? */
|
||||
error_code |= (exit_qualification & EPT_VIOLATION_INSTR)
|
||||
error_code |= (exit_qualification & EPT_VIOLATION_ACC_INSTR)
|
||||
? PFERR_FETCH_MASK : 0;
|
||||
/* ept page table entry is present? */
|
||||
error_code |= (exit_qualification &
|
||||
|
|
Загрузка…
Ссылка в новой задаче