[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250612081947.94081-1-chao.gao@intel.com>
Date: Thu, 12 Jun 2025 01:19:45 -0700
From: Chao Gao <chao.gao@...el.com>
To: linux-kernel@...r.kernel.org,
kvm@...r.kernel.org
Cc: seanjc@...gle.com,
pbonzini@...hat.com,
dapeng1.mi@...ux.intel.com,
Chao Gao <chao.gao@...el.com>
Subject: [PATCH 0/2] More cleanups to MSR interception code
Deduplicate MSR interception APIs and simplify the handling of IA32_XSS
MSR. This series builds upon Sean's MSR cleanups series [*]
[*]: https://lore.kernel.org/kvm/20250610225737.156318-1-seanjc@google.com/
Note that this series has been tested on Intel hardware only.
Chao Gao (2):
KVM: x86: Deduplicate MSR interception enabling and disabling
KVM: SVM: Simplify MSR interception logic for IA32_XSS MSR
arch/x86/kvm/svm/sev.c | 8 +++-----
arch/x86/kvm/svm/svm.c | 23 +++++++++--------------
arch/x86/kvm/svm/svm.h | 10 +---------
arch/x86/kvm/vmx/vmx.c | 25 +++++++++----------------
arch/x86/kvm/vmx/vmx.h | 10 +---------
5 files changed, 23 insertions(+), 53 deletions(-)
--
2.47.1
Powered by blists - more mailing lists