From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: [PATCH] introduce module parameter for ignoring unknown MSRs accesses Date: Thu, 25 Jun 2009 13:47:59 +0300 Message-ID: <4A4355DF.7000805@redhat.com> References: <4A420D4E.4060005@redhat.com> <1245926209-32280-1-git-send-email-andre.przywara@amd.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: kvm@vger.kernel.org, aliguori@us.ibm.com To: Andre Przywara Return-path: Received: from mx2.redhat.com ([66.187.237.31]:33815 "EHLO mx2.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752234AbZFYKqz (ORCPT ); Thu, 25 Jun 2009 06:46:55 -0400 In-Reply-To: <1245926209-32280-1-git-send-email-andre.przywara@amd.com> Sender: kvm-owner@vger.kernel.org List-ID: On 06/25/2009 01:36 PM, Andre Przywara wrote: > KVM will inject a #GP into the guest if that tries to access unhandled > MSRs. This will crash many guests. Although it would be the correct > way to actually handle these MSRs, we introduce a runtime switchable > module param called "ignore_msrs" (defaults to 0). If this is Y, unknown > MSR reads will return 0, while MSR writes are simply dropped. In both cases > we print a message to dmesg to inform the user about that. > You can change the behaviour at any time by saying: > # echo 1> /sys/modules/kvm/parameters/ignore_msrs > > Applied, thanks. -- error compiling committee.c: too many arguments to function