On Mon, Aug 13, 2018 at 1:45 PM, Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> wrote: > On Mon, Aug 13, 2018 at 09:31:42AM -0700, Drew Schmitt wrote: >> On Mon, Aug 13, 2018 at 6:50 AM Konrad Rzeszutek Wilk >> <konrad.wilk@xxxxxxxxxx> wrote: >> > >> > On Fri, Aug 10, 2018 at 02:26:03PM -0700, Drew Schmitt wrote: >> > > Add KVM_CAP_MSR_PLATFORM_INFO so that userspace can disable guest access >> > > to reads of MSR_PLATFORM_INFO. >> > >> > Or enable it - by default it is enabled. Perhaps by default it should >> > be disabled? >> >> We wanted to make this an opt-out functionality in order to not change >> the current default behavior (which today is a guest *can* read this >> MSR). > > <nods> What is the danger of disabling access to this in the first place? > Or providing by default some cooked up value ? Does it break Windows? Linux guests? It breaks a specific non-Windows/non-Linux guest.