From mboxrd@z Thu Jan 1 00:00:00 1970 From: Paolo Bonzini Subject: Re: [PATCH v4 09/13] nEPT: Add nEPT violation/misconfigration support Date: Mon, 29 Jul 2013 10:59:31 +0200 Message-ID: <51F62EF3.6060104@redhat.com> References: <1374750001-28527-1-git-send-email-gleb@redhat.com> <1374750001-28527-10-git-send-email-gleb@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: kvm@vger.kernel.org, Xiao Guangrong , Jun Nakajima , Yang Zhang To: Gleb Natapov Return-path: Received: from mx1.redhat.com ([209.132.183.28]:42918 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750877Ab3G2Kmc (ORCPT ); Mon, 29 Jul 2013 06:42:32 -0400 In-Reply-To: <1374750001-28527-10-git-send-email-gleb@redhat.com> Sender: kvm-owner@vger.kernel.org List-ID: Il 25/07/2013 12:59, Gleb Natapov ha scritto: > +#if PTTYPE == PTTYPE_EPT > +#define CHECK_BAD_MT_XWR(G) mmu->bad_mt_xwr & (1ull << ((G) & 0x3f)); > +#else > +#define CHECK_BAD_MT_XWR(G) 0; > +#endif > + > static bool FNAME(is_rsvd_bits_set)(struct kvm_mmu *mmu, u64 gpte, int level) > { > int bit7; > > bit7 = (gpte >> 7) & 1; > - return (gpte & mmu->rsvd_bits_mask[bit7][level-1]) != 0; > + return ((gpte & mmu->rsvd_bits_mask[bit7][level-1]) != 0) || > + CHECK_BAD_MT_XWR(gpte); > } > > +#undef CHECK_BAD_MT_XWR Instead of a macro, you can do if (...) return true; #if PTTYPE == PTTYPE_EPT if (...) return true; #endif return false; The compiler should be smart enough to generate the same code for non-EPT PTTYPE. > > + /* > + * Use PFERR_RSVD_MASK in erorr_code to to tell if EPT > + * misconfiguration requires to be injected. The detection is > + * done by is_rsvd_bits_set() above. erorr_code -> error_code This patch has warnings for unused static functions. You can squash them, or split them differently according to file boundaries (i.e. mmu.c first, vmx.c second). Paolo