From mboxrd@z Thu Jan 1 00:00:00 1970 From: Paolo Bonzini Subject: Re: rdmsr_safe in Linux PV (under Xen) gets an #GP:Re: [Fedora-xen] Running fedora xen on top of KVM? Date: Fri, 18 Sep 2015 17:27:55 +0200 Message-ID: <55FC2D7B.90108@redhat.com> References: <55F87984.7030903@redhat.com> <55F9C792.8070205@redhat.com> <55F9D95F.9040401@redhat.com> <20150916210814.GA4643@l.oracle.com> <55F9EF87.7030407@redhat.com> <20150917201053.GB12745@l.oracle.com> <20150918135411.GA25593@nazgul.tnic> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <20150918135411.GA25593@nazgul.tnic> Sender: kvm-owner@vger.kernel.org To: Borislav Petkov , Andy Lutomirski Cc: Konrad Rzeszutek Wilk , Cole Robinson , Xen Devel , kvm list , M A Young , xen List-Id: xen-devel@lists.xenproject.org On 18/09/2015 15:54, Borislav Petkov wrote: > On Thu, Sep 17, 2015 at 01:23:31PM -0700, Andy Lutomirski wrote: >> > Cc: Borislav. Is TSEG guaranteed to exist? Can we defer that until > Why not? It is the tseg base address. > > I think this is kvm injecting a #GP as it is not ignoring this MSR. > Presumably modprobing kvm with "ignore_msrs=1" or so should hide the > issue IIUC... We should return 0 for the tseg MSRs. KVM always handles them in the northbridge emulation code, like Intel chipsets do. Will send a patch. Paolo