aboutsummaryrefslogtreecommitdiff
path: root/arch/x86/entry/common.c
diff options
context:
space:
mode:
authorSean Christopherson <seanjc@google.com>2022-06-11 00:57:50 +0000
committerPaolo Bonzini <pbonzini@redhat.com>2022-06-20 11:49:20 -0400
commit0f4a7185270c4879fa40b33d7e07b6ac38353b34 (patch)
treefde7d692cc3a7bb2496262439d417658bb5724c4 /arch/x86/entry/common.c
parent9fc222967a39d6be96dabb942cc94e4f07ca049c (diff)
KVM: VMX: Give host userspace full control of MSR_IA32_PERF_CAPABILITIES
Do not clear manipulate MSR_IA32_PERF_CAPABILITIES in intel_pmu_refresh(), i.e. give userspace full control over capability/read-only MSRs. KVM is not a babysitter, it is userspace's responsiblity to provide a valid and coherent vCPU model. Attempting to "help" the guest by forcing a consistent model creates edge cases, and ironicially leads to inconsistent behavior. Example #1: KVM doesn't do intel_pmu_refresh() when userspace writes the MSR. Example #2: KVM doesn't clear the bits when the PMU is disabled, or when there's no architectural PMU. Signed-off-by: Sean Christopherson <seanjc@google.com> Message-Id: <20220611005755.753273-3-seanjc@google.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'arch/x86/entry/common.c')
0 files changed, 0 insertions, 0 deletions