* [PATCH] doc/kvm: Fix wrong entry for KVM_CAP_X86_MSR_FILTER
@ 2021-05-03 12:00 Siddharth Chandrasekaran
2021-05-03 15:16 ` Alexander Graf
2021-05-03 15:40 ` Paolo Bonzini
0 siblings, 2 replies; 3+ messages in thread
From: Siddharth Chandrasekaran @ 2021-05-03 12:00 UTC (permalink / raw)
To: Paolo Bonzini, Jonathan Corbet, Alexander Graf
Cc: Siddharth Chandrasekaran, Alexander Graf, kvm, linux-doc, linux-kernel
The capability that exposes new ioctl KVM_X86_SET_MSR_FILTER to
userspace is specified incorrectly as the ioctl itself (instead of
KVM_CAP_X86_MSR_FILTER). This patch fixes it.
Fixes: 1a155254ff93 ("KVM: x86: Introduce MSR filtering")
Cc: Alexander Graf <graf@amazon.de>
Signed-off-by: Siddharth Chandrasekaran <sidcha@amazon.de>
---
Documentation/virt/kvm/api.rst | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst
index 307f2fcf1b02..e778f4aa08f4 100644
--- a/Documentation/virt/kvm/api.rst
+++ b/Documentation/virt/kvm/api.rst
@@ -4713,7 +4713,7 @@ KVM_PV_VM_VERIFY
4.126 KVM_X86_SET_MSR_FILTER
----------------------------
-:Capability: KVM_X86_SET_MSR_FILTER
+:Capability: KVM_CAP_X86_MSR_FILTER
:Architectures: x86
:Type: vm ioctl
:Parameters: struct kvm_msr_filter
@@ -6586,7 +6586,7 @@ accesses that would usually trigger a #GP by KVM into the guest will
instead get bounced to user space through the KVM_EXIT_X86_RDMSR and
KVM_EXIT_X86_WRMSR exit notifications.
-8.27 KVM_X86_SET_MSR_FILTER
+8.27 KVM_CAP_X86_MSR_FILTER
---------------------------
:Architectures: x86
--
2.17.1
Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879
^ permalink raw reply related [flat|nested] 3+ messages in thread
* Re: [PATCH] doc/kvm: Fix wrong entry for KVM_CAP_X86_MSR_FILTER
2021-05-03 12:00 [PATCH] doc/kvm: Fix wrong entry for KVM_CAP_X86_MSR_FILTER Siddharth Chandrasekaran
@ 2021-05-03 15:16 ` Alexander Graf
2021-05-03 15:40 ` Paolo Bonzini
1 sibling, 0 replies; 3+ messages in thread
From: Alexander Graf @ 2021-05-03 15:16 UTC (permalink / raw)
To: Siddharth Chandrasekaran, Paolo Bonzini, Jonathan Corbet
Cc: Alexander Graf, kvm, linux-doc, linux-kernel
On 03.05.21 14:00, Siddharth Chandrasekaran wrote:
> The capability that exposes new ioctl KVM_X86_SET_MSR_FILTER to
> userspace is specified incorrectly as the ioctl itself (instead of
> KVM_CAP_X86_MSR_FILTER). This patch fixes it.
>
> Fixes: 1a155254ff93 ("KVM: x86: Introduce MSR filtering")
> Cc: Alexander Graf <graf@amazon.de>
> Signed-off-by: Siddharth Chandrasekaran <sidcha@amazon.de>
Reviewed-by: Alexander Graf <graf@amazon.com>
Alex
> ---
> Documentation/virt/kvm/api.rst | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst
> index 307f2fcf1b02..e778f4aa08f4 100644
> --- a/Documentation/virt/kvm/api.rst
> +++ b/Documentation/virt/kvm/api.rst
> @@ -4713,7 +4713,7 @@ KVM_PV_VM_VERIFY
> 4.126 KVM_X86_SET_MSR_FILTER
> ----------------------------
>
> -:Capability: KVM_X86_SET_MSR_FILTER
> +:Capability: KVM_CAP_X86_MSR_FILTER
> :Architectures: x86
> :Type: vm ioctl
> :Parameters: struct kvm_msr_filter
> @@ -6586,7 +6586,7 @@ accesses that would usually trigger a #GP by KVM into the guest will
> instead get bounced to user space through the KVM_EXIT_X86_RDMSR and
> KVM_EXIT_X86_WRMSR exit notifications.
>
> -8.27 KVM_X86_SET_MSR_FILTER
> +8.27 KVM_CAP_X86_MSR_FILTER
> ---------------------------
>
> :Architectures: x86
>
Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [PATCH] doc/kvm: Fix wrong entry for KVM_CAP_X86_MSR_FILTER
2021-05-03 12:00 [PATCH] doc/kvm: Fix wrong entry for KVM_CAP_X86_MSR_FILTER Siddharth Chandrasekaran
2021-05-03 15:16 ` Alexander Graf
@ 2021-05-03 15:40 ` Paolo Bonzini
1 sibling, 0 replies; 3+ messages in thread
From: Paolo Bonzini @ 2021-05-03 15:40 UTC (permalink / raw)
To: Siddharth Chandrasekaran, Jonathan Corbet, Alexander Graf
Cc: Alexander Graf, kvm, linux-doc, linux-kernel
On 03/05/21 14:00, Siddharth Chandrasekaran wrote:
> The capability that exposes new ioctl KVM_X86_SET_MSR_FILTER to
> userspace is specified incorrectly as the ioctl itself (instead of
> KVM_CAP_X86_MSR_FILTER). This patch fixes it.
>
> Fixes: 1a155254ff93 ("KVM: x86: Introduce MSR filtering")
> Cc: Alexander Graf <graf@amazon.de>
> Signed-off-by: Siddharth Chandrasekaran <sidcha@amazon.de>
> ---
> Documentation/virt/kvm/api.rst | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst
> index 307f2fcf1b02..e778f4aa08f4 100644
> --- a/Documentation/virt/kvm/api.rst
> +++ b/Documentation/virt/kvm/api.rst
> @@ -4713,7 +4713,7 @@ KVM_PV_VM_VERIFY
> 4.126 KVM_X86_SET_MSR_FILTER
> ----------------------------
>
> -:Capability: KVM_X86_SET_MSR_FILTER
> +:Capability: KVM_CAP_X86_MSR_FILTER
> :Architectures: x86
> :Type: vm ioctl
> :Parameters: struct kvm_msr_filter
> @@ -6586,7 +6586,7 @@ accesses that would usually trigger a #GP by KVM into the guest will
> instead get bounced to user space through the KVM_EXIT_X86_RDMSR and
> KVM_EXIT_X86_WRMSR exit notifications.
>
> -8.27 KVM_X86_SET_MSR_FILTER
> +8.27 KVM_CAP_X86_MSR_FILTER
> ---------------------------
>
> :Architectures: x86
>
Queued, thanks.
Paolo
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2021-05-03 15:40 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-05-03 12:00 [PATCH] doc/kvm: Fix wrong entry for KVM_CAP_X86_MSR_FILTER Siddharth Chandrasekaran
2021-05-03 15:16 ` Alexander Graf
2021-05-03 15:40 ` Paolo Bonzini
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).