KVM: VMX: use EPT_VIOLATION_GVA_TRANSLATED instead of 0x100
authorIsaku Yamahata <isaku.yamahata@intel.com>
Fri, 23 Apr 2021 00:22:29 +0000 (17:22 -0700)
committerPaolo Bonzini <pbonzini@redhat.com>
Fri, 23 Apr 2021 11:43:11 +0000 (07:43 -0400)
Use symbolic value, EPT_VIOLATION_GVA_TRANSLATED, instead of 0x100
in handle_ept_violation().

Signed-off-by: Yao Yuan <yuan.yao@intel.com>
Signed-off-by: Isaku Yamahata <isaku.yamahata@intel.com>
Message-Id: <724e8271ea301aece3eb2afe286a9e2e92a70b18.1619136576.git.isaku.yamahata@intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/kvm/vmx/vmx.c

index 6501d66..2791c2b 100644 (file)
@@ -5398,7 +5398,7 @@ static int handle_ept_violation(struct kvm_vcpu *vcpu)
                        EPT_VIOLATION_EXECUTABLE))
                      ? PFERR_PRESENT_MASK : 0;
 
-       error_code |= (exit_qualification & 0x100) != 0 ?
+       error_code |= (exit_qualification & EPT_VIOLATION_GVA_TRANSLATED) != 0 ?
               PFERR_GUEST_FINAL_MASK : PFERR_GUEST_PAGE_MASK;
 
        vcpu->arch.exit_qualification = exit_qualification;