aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/arch/x86/include
diff options
context:
space:
mode:
authorDrew Schmitt <dasch@google.com>2018-08-20 10:32:15 -0700
committerPaolo Bonzini <pbonzini@redhat.com>2018-09-20 00:51:46 +0200
commit6fbbde9a1969dfb476467ebf69a475095ef3fd4d (patch)
tree39bdc75de08111b9b6a7a28e238eb8efca0841cc /arch/x86/include
parentKVM: x86: Turbo bits in MSR_PLATFORM_INFO (diff)
downloadwireguard-linux-6fbbde9a1969dfb476467ebf69a475095ef3fd4d.tar.xz
wireguard-linux-6fbbde9a1969dfb476467ebf69a475095ef3fd4d.zip
KVM: x86: Control guest reads of MSR_PLATFORM_INFO
Add KVM_CAP_MSR_PLATFORM_INFO so that userspace can disable guest access to reads of MSR_PLATFORM_INFO. Disabling access to reads of this MSR gives userspace the control to "expose" this platform-dependent information to guests in a clear way. As it exists today, guests that read this MSR would get unpopulated information if userspace hadn't already set it (and prior to this patch series, only the CPUID faulting information could have been populated). This existing interface could be confusing if guests don't handle the potential for incorrect/incomplete information gracefully (e.g. zero reported for base frequency). Signed-off-by: Drew Schmitt <dasch@google.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'arch/x86/include')
-rw-r--r--arch/x86/include/asm/kvm_host.h2
1 files changed, 2 insertions, 0 deletions
diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
index af63c2ca1616..09b2e3e2cf1b 100644
--- a/arch/x86/include/asm/kvm_host.h
+++ b/arch/x86/include/asm/kvm_host.h
@@ -869,6 +869,8 @@ struct kvm_arch {
bool x2apic_format;
bool x2apic_broadcast_quirk_disabled;
+
+ bool guest_can_read_msr_platform_info;
};
struct kvm_vm_stat {