Skip to content

Commit 549a715

Browse files
sean-jcbonzini
authored andcommitted
KVM: x86: Add proper ReST tables for userspace MSR exits/flags
Add ReST formatting to the set of userspace MSR exits/flags so that the resulting HTML docs generate a table instead of malformed gunk. This also fixes a warning that was introduced by a recent cleanup of the relevant documentation (yay copy+paste). >> Documentation/virt/kvm/api.rst:7287: WARNING: Block quote ends without a blank line; unexpected unindent. Fixes: 1ae0995 ("KVM: x86: Allow deflecting unknown MSR accesses to user space") Fixes: 1f15814 ("KVM: x86: Clean up KVM_CAP_X86_USER_SPACE_MSR documentation") Reported-by: kernel test robot <lkp@intel.com> Signed-off-by: Sean Christopherson <seanjc@google.com> Message-Id: <20221207000959.2035098-1-seanjc@google.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
1 parent 9352e74 commit 549a715

File tree

1 file changed

+12
-8
lines changed

1 file changed

+12
-8
lines changed

Documentation/virt/kvm/api.rst

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6455,9 +6455,11 @@ The "reason" field specifies why the MSR interception occurred. Userspace will
64556455
only receive MSR exits when a particular reason was requested during through
64566456
ENABLE_CAP. Currently valid exit reasons are:
64576457

6458-
KVM_MSR_EXIT_REASON_UNKNOWN - access to MSR that is unknown to KVM
6459-
KVM_MSR_EXIT_REASON_INVAL - access to invalid MSRs or reserved bits
6460-
KVM_MSR_EXIT_REASON_FILTER - access blocked by KVM_X86_SET_MSR_FILTER
6458+
============================ ========================================
6459+
KVM_MSR_EXIT_REASON_UNKNOWN access to MSR that is unknown to KVM
6460+
KVM_MSR_EXIT_REASON_INVAL access to invalid MSRs or reserved bits
6461+
KVM_MSR_EXIT_REASON_FILTER access blocked by KVM_X86_SET_MSR_FILTER
6462+
============================ ========================================
64616463

64626464
For KVM_EXIT_X86_RDMSR, the "index" field tells userspace which MSR the guest
64636465
wants to read. To respond to this request with a successful read, userspace
@@ -7256,11 +7258,13 @@ to inform a user that an MSR was not emulated/virtualized by KVM.
72567258

72577259
The valid mask flags are:
72587260

7259-
KVM_MSR_EXIT_REASON_UNKNOWN - intercept accesses to unknown (to KVM) MSRs
7260-
KVM_MSR_EXIT_REASON_INVAL - intercept accesses that are architecturally
7261-
invalid according to the vCPU model and/or mode
7262-
KVM_MSR_EXIT_REASON_FILTER - intercept accesses that are denied by userspace
7263-
via KVM_X86_SET_MSR_FILTER
7261+
============================ ===============================================
7262+
KVM_MSR_EXIT_REASON_UNKNOWN intercept accesses to unknown (to KVM) MSRs
7263+
KVM_MSR_EXIT_REASON_INVAL intercept accesses that are architecturally
7264+
invalid according to the vCPU model and/or mode
7265+
KVM_MSR_EXIT_REASON_FILTER intercept accesses that are denied by userspace
7266+
via KVM_X86_SET_MSR_FILTER
7267+
============================ ===============================================
72647268

72657269
7.22 KVM_CAP_X86_BUS_LOCK_EXIT
72667270
-------------------------------

0 commit comments

Comments
 (0)