Dong, Eddie wrote:
> Avi:
>       We (Yunfeng) encountered some warning from KVM in certain
> situation like:
> "kvm: 9612: cpu0 unhandled wrmsr: 0xc1"
>       Further check find that we are doing MSR write virtualization
> per a predefined whitelist and give gp fault for others. On the other
> hand, Xen just silently return (no gp fault). We may not implement
> policy for all MSRs, but not sure if injecting gp fault for them will
> cause problem.
>   

Silently returning is IMO problematic.  If a guest depends on the 
correct behavior of some msr, and we mis-emulate it by ignoring it, then 
we get a guest failure with no message in the kernel to point us in the 
right direction.

In the case of 0xc1, this is the performance counter, likely used for 
the nmi watchdog.  If we ignore it, the guest kernel will just report a 
soft lockup and hang.  So there are only two realistic options left:

- printk() and ignore - that is a mis-emulation of writes to msrs that 
are supposed to #gp
- printk() and #gp - that is a mis-emulation of writes to msrs that must 
be handled.  But there are fewer of these than msrs that need to #gp.

So I think the current behavior is best.  Unhandled msrs are rare, we 
just need to implement them when they happen.


-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >>  http://get.splunk.com/
_______________________________________________
kvm-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/kvm-devel

Reply via email to