[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Xen-devel] [PATCH v2 1/2] x86/msr: Carry on after a non-"safe" MSR access fails without !panic_on_oops
 
- To: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>,	Ingo Molnar <mingo@xxxxxxxxxx>
 
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
 
- Date: Wed, 30 Sep 2015 11:32:00 -0700
 
- Cc: KVM list <kvm@xxxxxxxxxxxxxxx>, Peter Zijlstra <peterz@xxxxxxxxxxxxx>,	the arch/x86 maintainers <x86@xxxxxxxxxx>,	Linux Kernel Mailing List <linux-kernel@xxxxxxxxxxxxxxx>,	xen-devel <Xen-devel@xxxxxxxxxxxxx>, Paolo Bonzini <pbonzini@xxxxxxxxxx>,	Thomas Gleixner <tglx@xxxxxxxxxxxxx>,	Andy Lutomirski <luto@xxxxxxxxxxxxxx>,	Arjan van de Ven <arjan@xxxxxxxxxxxxxxx>,	Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
 
- Delivery-date: Wed, 30 Sep 2015 18:33:15 +0000
 
- List-id: Xen developer discussion <xen-devel.lists.xen.org>
 
 
 
On 09/21/2015 09:36 AM, Linus Torvalds wrote:
> 
> How many msr reads are <i>so</i> critical that the function call
> overhead would matter? Get rid of the inline version of the _safe()
> thing too, and put that thing there too.
> 
Probably only the ones that may go in the context switch path.
        -hpa
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
 
    
     |