]> git.ipfire.org Git - thirdparty/linux.git/commitdiff
KVM: SVM: Drop explicit check on MSRPM offset when emulating SEV-ES accesses
authorSean Christopherson <seanjc@google.com>
Tue, 10 Jun 2025 22:57:29 +0000 (15:57 -0700)
committerSean Christopherson <seanjc@google.com>
Fri, 20 Jun 2025 20:07:32 +0000 (13:07 -0700)
Now that msr_write_intercepted() defaults to true, i.e. accurately reflects
hardware behavior for out-of-range MSRs, and doesn't WARN (or BUG) on an
out-of-range MSR, drop sev_es_prevent_msr_access()'s svm_msrpm_offset()
check that guarded against calling msr_write_intercepted() with a "bad"
index.

Opportunistically clean up the helper's formatting.

Link: https://lore.kernel.org/r/20250610225737.156318-25-seanjc@google.com
Signed-off-by: Sean Christopherson <seanjc@google.com>
arch/x86/kvm/svm/svm.c

index a6d6d3973a6b6adc4174c63f2c569d9b6b0511d5..6a87e684110b6d1ef7e5b540531eb0ea743547b4 100644 (file)
@@ -2754,12 +2754,11 @@ static int svm_get_feature_msr(u32 msr, u64 *data)
        return 0;
 }
 
-static bool
-sev_es_prevent_msr_access(struct kvm_vcpu *vcpu, struct msr_data *msr_info)
+static bool sev_es_prevent_msr_access(struct kvm_vcpu *vcpu,
+                                     struct msr_data *msr_info)
 {
        return sev_es_guest(vcpu->kvm) &&
               vcpu->arch.guest_state_protected &&
-              svm_msrpm_offset(msr_info->index) != MSR_INVALID &&
               !msr_write_intercepted(vcpu, msr_info->index);
 }