Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751995AbcDBPN6 (ORCPT ); Sat, 2 Apr 2016 11:13:58 -0400 Received: from mail-oi0-f50.google.com ([209.85.218.50]:32864 "EHLO mail-oi0-f50.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751302AbcDBPN4 (ORCPT ); Sat, 2 Apr 2016 11:13:56 -0400 MIME-Version: 1.0 In-Reply-To: References: From: Andy Lutomirski Date: Sat, 2 Apr 2016 08:13:36 -0700 Message-ID: Subject: Re: [PATCH v5 0/9] Improve non-"safe" MSR access failure handling To: Linus Torvalds Cc: Andy Lutomirski , X86 ML , Paolo Bonzini , Peter Zijlstra , KVM list , Arjan van de Ven , xen-devel , Linux Kernel Mailing List , Andrew Morton , Borislav Petkov Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 754 Lines: 19 On Sat, Apr 2, 2016 at 7:24 AM, Linus Torvalds wrote: > This patch series looks much nicer than the last one. I assume you > tested that the early-trap handling actually worked too? I only looked > at the patches.. > > Ack to it all, I injected some BUGs in various places on 32-bit an 64-bit and it seemed to do the right thing. Depending on how early they were, I either got a clean hang or I got a printout, and whether it displayed anything didn't seem to change with and without the patches. I think that early_printk doesn't work from the very very beginning. I also tried a bad wrmsrl at a couple early points. Very very early it just works with not warning. A little later and it prints the warning. --Andy