From mboxrd@z Thu Jan 1 00:00:00 1970 From: Paolo Bonzini Subject: Re: [PATCH 0/3] x86/paravirt: Fix baremetal paravirt MSR ops Date: Thu, 17 Sep 2015 17:33:31 +0200 Message-ID: <55FADD4B.601@redhat.com> References: <20150917071920.GA14296@gmail.com> <55FADBE6.9040008@linux.intel.com> <55FADC3D.70202@redhat.com> <55FADCBD.4070804@linux.intel.com> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Cc: Andy Lutomirski , X86 ML , Peter Zijlstra , KVM list , xen-devel , "linux-kernel@vger.kernel.org" , Linus Torvalds , Thomas Gleixner , Peter Zijlstra , Andrew Morton , "H. Peter Anvin" To: Arjan van de Ven , Andy Lutomirski , Ingo Molnar Return-path: In-Reply-To: <55FADCBD.4070804@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org List-Id: kvm.vger.kernel.org On 17/09/2015 17:31, Arjan van de Ven wrote: >> >> What about 0 + WARN? > > why 0? > > 0xdeadbeef or any other pattern (even 0x3636363636) makes more sense (of > course also WARN... but most folks don't read dmesg for WARNs) > > (it's the same thing we do for list or slab poison stuff) Sorry, brain fart. That makes sense for the safe variants. It would require some auditing though. Paolo