From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755410AbcCNODH (ORCPT ); Mon, 14 Mar 2016 10:03:07 -0400 Received: from mx1.redhat.com ([209.132.183.28]:50790 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754801AbcCNODF (ORCPT ); Mon, 14 Mar 2016 10:03:05 -0400 Subject: Re: [PATCH v3 3/5] x86/paravirt: Add paravirt_{read,write}_msr To: Andy Lutomirski , X86 ML References: Cc: Peter Zijlstra , KVM list , Arjan van de Ven , xen-devel , "linux-kernel@vger.kernel.org" , Linus Torvalds , Andrew Morton From: Paolo Bonzini Message-ID: <56E6C492.5060308@redhat.com> Date: Mon, 14 Mar 2016 15:02:58 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/03/2016 20:06, Andy Lutomirski wrote: > This adds paravirt hooks for unsafe MSR access. On native, they > call native_{read,write}_msr. On Xen, they use > xen_{read,write}_msr_safe. > > Nothing uses them yet for ease of bisection. The next patch will > use them in rdmsrl, wrmsrl, etc. > > I intentionally didn't make them OOPS on #GP on Xen. I think that > should be done separately by the Xen maintainers. Please do the same for KVM. Paolo