On Fri, Sep 18, 2015 at 08:20:46AM -0700, Andy Lutomirski wrote:
> In any event, Borislav, you must have typed rdmsr_safe for a reason :)
Wasn't me:
6c62aa4a3c12 ("x86: make amd.c have 64bit support code")
I think the error handling of rdmsrl_safe() was needed to do the pfn
games which are done in the if-clause.
> Either rdmsr_safe in that context is broken on Xen and not native
> (which is entirely possible -- I didn't check carefully) or the
> rdmsr_safe isn't "safe" on any type of kernel. Persumably either the
> kernel or KVM (or both) should be fixed.
What Paolo said.
> Given that we can handle fixups in the decompressor, surely it
> wouldn't be so hard to make early GPF fixups work in the main kernel.
Frankly, I still am wondering what a sensible use case of running xen
hypervisor/dom0 as a kvm guest would be.
--
Regards/Gruss,
Boris.
ECO tip #101: Trim your mails when you reply.
--
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html