KVM: x86/mmu: Derive EPT violation RWX bits from EPTE RWX bits
authorSean Christopherson <seanjc@google.com>
Tue, 29 Mar 2022 03:01:07 +0000 (11:01 +0800)
committerPaolo Bonzini <pbonzini@redhat.com>
Wed, 13 Apr 2022 17:37:37 +0000 (13:37 -0400)
commitca2a7c22a115d1a9a60ce4f61fe43d5fcaaaa516
tree681a5d27637010cc10786ca7e7a1f53da61dbb5f
parentaecce510fee5620bf1906f94772fdda3b9966455
KVM: x86/mmu: Derive EPT violation RWX bits from EPTE RWX bits

Derive the mask of RWX bits reported on EPT violations from the mask of
RWX bits that are shoved into EPT entries; the layout is the same, the
EPT violation bits are simply shifted by three.  Use the new shift and a
slight copy-paste of the mask derivation instead of completely open
coding the same to convert between the EPT entry bits and the exit
qualification when synthesizing a nested EPT Violation.

No functional change intended.

Cc: SU Hang <darcy.sh@antgroup.com>
Signed-off-by: Sean Christopherson <seanjc@google.com>
Message-Id: <20220329030108.97341-3-darcy.sh@antgroup.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/include/asm/vmx.h
arch/x86/kvm/mmu/paging_tmpl.h
arch/x86/kvm/vmx/vmx.c