From mboxrd@z Thu Jan 1 00:00:00 1970 From: Arjan van de Ven Subject: Re: [PATCH v2 1/2] x86/msr: Carry on after a non-"safe" MSR access fails without !panic_on_oops Date: Mon, 21 Sep 2015 09:49:10 -0700 Message-ID: <56003506.1050100@linux.intel.com> References: <130a3b7ef4788baae3a6fe71293ab17442bc9a0a.1442793572.git.luto@kernel.org> <20150921084642.GA30984@gmail.com> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Cc: Andy Lutomirski , Thomas Gleixner , Paolo Bonzini , xen-devel , Andrew Morton , KVM list , the arch/x86 maintainers , Linux Kernel Mailing List , Peter Zijlstra To: Linus Torvalds , Ingo Molnar Return-path: In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org List-Id: kvm.vger.kernel.org On 9/21/2015 9:36 AM, Linus Torvalds wrote: > On Mon, Sep 21, 2015 at 1:46 AM, Ingo Molnar wrote: >> >> Linus, what's your preference? > > So quite frankly, is there any reason we don't just implement > native_read_msr() as just > > unsigned long long native_read_msr(unsigned int msr) > { > int err; > unsigned long long val; > > val = native_read_msr_safe(msr, &err); > WARN_ON_ONCE(err); > return val; > } > > Note: no inline, no nothing. Just put it in arch/x86/lib/msr.c, and be > done with it. I don't see the downside. > > How many msr reads are so critical that the function call > overhead would matter? if anything qualifies it'd be switch_to() and friends. note that I'm not entirely happy about the notion of "safe" MSRs. They're safe as in "won't fault". Reading random MSRs isn't a generic safe operation though, but the name sort of gives people the impression that it is. Even with _safe variants, you still need to KNOW the MSR exists (by means of CPUID or similar) unfortunately.