From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 86AB0C433FE for ; Tue, 29 Mar 2022 03:01:20 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231403AbiC2DDA (ORCPT ); Mon, 28 Mar 2022 23:03:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58692 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231373AbiC2DC5 (ORCPT ); Mon, 28 Mar 2022 23:02:57 -0400 Received: from out0-142.mail.aliyun.com (out0-142.mail.aliyun.com [140.205.0.142]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1812923F9F6; Mon, 28 Mar 2022 20:01:13 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R151e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018047187;MF=darcy.sh@antgroup.com;NM=1;PH=DS;RN=12;SR=0;TI=SMTPD_---.NF0ngfN_1648522870; Received: from localhost(mailfrom:darcy.sh@antgroup.com fp:SMTPD_---.NF0ngfN_1648522870) by smtp.aliyun-inc.com(127.0.0.1); Tue, 29 Mar 2022 11:01:10 +0800 From: "SU Hang" To: seanjc@google.com, kvm@vger.kernel.org Cc: "Lai Jiangshan" , "SU Hang" , "Thomas Gleixner" , "Ingo Molnar" , "Borislav Petkov" , "H. Peter Anvin" , , "Paolo Bonzini" , "=?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?=" , Subject: [PATCH v2 0/2] KVM: x86: Replace magic number with readable macro Date: Tue, 29 Mar 2022 11:01:05 +0800 Message-Id: <20220329030108.97341-1-darcy.sh@antgroup.com> X-Mailer: git-send-email 2.32.0.3.g01195cf9f MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Replace magic number 0x180 with `EPT_VIOLATION_GVA_IS_VALID | EPT_VIOLATION_GVA_TRANSLATED` in arch/x86/kvm/mmu/paging_tmpl.h Similarly, replace `(pte_access & 0x7) << 3` with `(pte_access & VMX_EPT_RWX_MASK) << EPT_VIOLATION_RWX_SHIFT`. v1 -> v2: https://lore.kernel.org/kvm/20220321094203.109546-1-darcy.sh@antgroup.com/ - Rename `EPT_VIOLATION_GVA_VALIDATION` to `EPT_VIOLATION_GVA_IS_VALID`. [Sean] - Using new added `VMX_EPT_RWX_MASK` to replace magic number 0x7 and so on, to avoid using branch statement in hotpath. [Sean] SU Hang (1): KVM: VMX: replace 0x180 with EPT_VIOLATION_* definition Sean Christopherson (1): KVM: x86/mmu: Derive EPT violation RWX bits from EPTE RWX bits arch/x86/include/asm/vmx.h | 9 +++------ arch/x86/kvm/mmu/paging_tmpl.h | 11 +++++++++-- arch/x86/kvm/vmx/vmx.c | 4 +--- 3 files changed, 13 insertions(+), 11 deletions(-) -- 2.32.0.3.g01195cf9f