kvm: x86: mmu: Rename EPT_VIOLATION_READ/WRITE/INSTR constants
authorJunaid Shahid <junaids@google.com>
Thu, 22 Dec 2016 04:29:28 +0000 (20:29 -0800)
committerPaolo Bonzini <pbonzini@redhat.com>
Fri, 27 Jan 2017 14:46:38 +0000 (15:46 +0100)
Rename the EPT_VIOLATION_READ/WRITE/INSTR constants to
EPT_VIOLATION_ACC_READ/WRITE/INSTR to more clearly indicate that these
signify the type of the memory access as opposed to the permissions
granted by the PTE.

Signed-off-by: Junaid Shahid <junaids@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/include/asm/vmx.h
arch/x86/kvm/vmx.c

index a22a4790f1ac62272a72e52ddfb7ce21ab2632c3..cc54b70265674e8149239b667d63a42e3aa4b58d 100644 (file)
@@ -510,15 +510,15 @@ struct vmx_msr_entry {
 /*
  * Exit Qualifications for EPT Violations
  */
-#define EPT_VIOLATION_READ_BIT         0
-#define EPT_VIOLATION_WRITE_BIT                1
-#define EPT_VIOLATION_INSTR_BIT                2
+#define EPT_VIOLATION_ACC_READ_BIT     0
+#define EPT_VIOLATION_ACC_WRITE_BIT    1
+#define EPT_VIOLATION_ACC_INSTR_BIT    2
 #define EPT_VIOLATION_READABLE_BIT     3
 #define EPT_VIOLATION_WRITABLE_BIT     4
 #define EPT_VIOLATION_EXECUTABLE_BIT   5
-#define EPT_VIOLATION_READ             (1 << EPT_VIOLATION_READ_BIT)
-#define EPT_VIOLATION_WRITE            (1 << EPT_VIOLATION_WRITE_BIT)
-#define EPT_VIOLATION_INSTR            (1 << EPT_VIOLATION_INSTR_BIT)
+#define EPT_VIOLATION_ACC_READ         (1 << EPT_VIOLATION_ACC_READ_BIT)
+#define EPT_VIOLATION_ACC_WRITE                (1 << EPT_VIOLATION_ACC_WRITE_BIT)
+#define EPT_VIOLATION_ACC_INSTR                (1 << EPT_VIOLATION_ACC_INSTR_BIT)
 #define EPT_VIOLATION_READABLE         (1 << EPT_VIOLATION_READABLE_BIT)
 #define EPT_VIOLATION_WRITABLE         (1 << EPT_VIOLATION_WRITABLE_BIT)
 #define EPT_VIOLATION_EXECUTABLE       (1 << EPT_VIOLATION_EXECUTABLE_BIT)
index c7bafa1457e2954407cdfc2fff560a2c9ef4caa9..81c301def1af94b8c72b62ffe1b730300f091b6d 100644 (file)
@@ -6375,13 +6375,13 @@ static int handle_ept_violation(struct kvm_vcpu *vcpu)
        trace_kvm_page_fault(gpa, exit_qualification);
 
        /* Is it a read fault? */
-       error_code = (exit_qualification & EPT_VIOLATION_READ)
+       error_code = (exit_qualification & EPT_VIOLATION_ACC_READ)
                     ? PFERR_USER_MASK : 0;
        /* Is it a write fault? */
-       error_code |= (exit_qualification & EPT_VIOLATION_WRITE)
+       error_code |= (exit_qualification & EPT_VIOLATION_ACC_WRITE)
                      ? PFERR_WRITE_MASK : 0;
        /* Is it a fetch fault? */
-       error_code |= (exit_qualification & EPT_VIOLATION_INSTR)
+       error_code |= (exit_qualification & EPT_VIOLATION_ACC_INSTR)
                      ? PFERR_FETCH_MASK : 0;
        /* ept page table entry is present? */
        error_code |= (exit_qualification &