diff options
author | Drew Schmitt <dasch@google.com> | 2018-08-20 10:32:15 -0700 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2018-09-20 00:51:46 +0200 |
commit | 6fbbde9a1969dfb476467ebf69a475095ef3fd4d (patch) | |
tree | 39bdc75de08111b9b6a7a28e238eb8efca0841cc /include | |
parent | d84f1cff9028c00ee870f0293b0c7a3866071dfa (diff) | |
download | linux-stable-6fbbde9a1969dfb476467ebf69a475095ef3fd4d.tar.gz linux-stable-6fbbde9a1969dfb476467ebf69a475095ef3fd4d.tar.bz2 linux-stable-6fbbde9a1969dfb476467ebf69a475095ef3fd4d.zip |
KVM: x86: Control guest reads of MSR_PLATFORM_INFO
Add KVM_CAP_MSR_PLATFORM_INFO so that userspace can disable guest access
to reads of MSR_PLATFORM_INFO.
Disabling access to reads of this MSR gives userspace the control to "expose"
this platform-dependent information to guests in a clear way. As it exists
today, guests that read this MSR would get unpopulated information if userspace
hadn't already set it (and prior to this patch series, only the CPUID faulting
information could have been populated). This existing interface could be
confusing if guests don't handle the potential for incorrect/incomplete
information gracefully (e.g. zero reported for base frequency).
Signed-off-by: Drew Schmitt <dasch@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'include')
-rw-r--r-- | include/uapi/linux/kvm.h | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h index 07548de5c988..251be353f950 100644 --- a/include/uapi/linux/kvm.h +++ b/include/uapi/linux/kvm.h @@ -952,6 +952,7 @@ struct kvm_ppc_resize_hpt { #define KVM_CAP_S390_HPAGE_1M 156 #define KVM_CAP_NESTED_STATE 157 #define KVM_CAP_ARM_INJECT_SERROR_ESR 158 +#define KVM_CAP_MSR_PLATFORM_INFO 159 #ifdef KVM_CAP_IRQ_ROUTING |