KVM: x86: Simplify userspace filter logic when disabling MSR interception
authorSean Christopherson <seanjc@google.com>
Tue, 10 Jun 2025 22:57:36 +0000 (15:57 -0700)
committerSean Christopherson <seanjc@google.com>
Fri, 20 Jun 2025 20:07:37 +0000 (13:07 -0700)
commitbea44d1992401b5e1a0d213cba85f9c53f492e8a
treed96658b57077bda66ebf0ed40b795fc9d40cfb8f
parent73be81b3bb7cd7951046eedee6efb00e4afc5e02
KVM: x86: Simplify userspace filter logic when disabling MSR interception

Refactor {svm,vmx}_disable_intercept_for_msr() to simplify the handling of
userspace filters that disallow access to an MSR.  The more complicated
logic is no longer needed or justified now that KVM recalculates all MSR
intercepts on a userspace MSR filter change, i.e. now that KVM doesn't
need to also update shadow bitmaps.

No functional change intended.

Suggested-by: Dapeng Mi <dapeng1.mi@linux.intel.com>
Reviewed-by: Dapeng Mi <dapeng1.mi@linux.intel.com>
Link: https://lore.kernel.org/r/20250610225737.156318-32-seanjc@google.com
Signed-off-by: Sean Christopherson <seanjc@google.com>
arch/x86/kvm/svm/svm.c
arch/x86/kvm/vmx/vmx.c