[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Xen-devel] [PATCH v2 1/2] x86/msr: Carry on after a non-"safe" MSR access fails without !panic_on_oops
 
- To: Andy Lutomirski <luto@xxxxxxxxxxxxxx>,	Arjan van de Ven <arjan@xxxxxxxxxxxxxxx>
 
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
 
- Date: Tue, 22 Sep 2015 10:12:36 +0200
 
- Cc: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>, KVM list <kvm@xxxxxxxxxxxxxxx>,	Peter Zijlstra <peterz@xxxxxxxxxxxxx>,	the arch/x86 maintainers <x86@xxxxxxxxxx>,	Linux Kernel Mailing List <linux-kernel@xxxxxxxxxxxxxxx>,	xen-devel <Xen-devel@xxxxxxxxxxxxx>, Thomas Gleixner <tglx@xxxxxxxxxxxxx>,	Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>,	Ingo Molnar <mingo@xxxxxxxxxx>
 
- Delivery-date: Tue, 22 Sep 2015 08:13:03 +0000
 
- List-id: Xen developer discussion <xen-devel.lists.xen.org>
 
 
 
On 21/09/2015 19:43, Andy Lutomirski wrote:
> And maybe the KVM user return notifier.
No, not really.  If anything, the place in KVM where it makes a
difference is vmx_save_host_state, which is also only using
always-present MSRs.  But don't care about KVM.
First clean it up, then we can add back inline versions like __rdmsr or
rdmsr_fault or rdmsr_unsafe or whatever.
Paolo
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
 
 
    
     |