Skip to content
Snippets Groups Projects
Commit a8f70d84 authored by Vitaly Kuznetsov's avatar Vitaly Kuznetsov
Browse files

KVM: x86: Introduce KVM_CAP_DISABLE_QUIRKS2

Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2074832



commit 6d849191
Author: Oliver Upton <oupton@google.com>
Date:   Tue Mar 1 06:03:47 2022 +0000

    KVM: x86: Introduce KVM_CAP_DISABLE_QUIRKS2

    KVM_CAP_DISABLE_QUIRKS is irrevocably broken. The capability does not
    advertise the set of quirks which may be disabled to userspace, so it is
    impossible to predict the behavior of KVM. Worse yet,
    KVM_CAP_DISABLE_QUIRKS will tolerate any value for cap->args[0], meaning
    it fails to reject attempts to set invalid quirk bits.

    The only valid workaround for the quirky quirks API is to add a new CAP.
    Actually advertise the set of quirks that can be disabled to userspace
    so it can predict KVM's behavior. Reject values for cap->args[0] that
    contain invalid bits.

    Finally, add documentation for the new capability and describe the
    existing quirks.

Signed-off-by: default avatarOliver Upton <oupton@google.com>
    Message-Id: <20220301060351.442881-5-oupton@google.com>
Signed-off-by: default avatarPaolo Bonzini <pbonzini@redhat.com>

Conflicts:
	Documentation/virt/kvm/api.rst (skipping 93b71801)

Signed-off-by: default avatarVitaly Kuznetsov <vkuznets@redhat.com>
parent 4ac5496f
No related branches found
No related tags found
No related merge requests found
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment