From mboxrd@z Thu Jan 1 00:00:00 1970 From: Boris Ostrovsky Subject: Re: [PATCH 1/3] x86/xen: Avoid fast syscall path for Xen PV guests Date: Wed, 18 Nov 2015 17:05:23 -0500 Message-ID: <564CF623.40502@oracle.com> References: <1447877179-2775-1-git-send-email-boris.ostrovsky@oracle.com> <1447877179-2775-2-git-send-email-boris.ostrovsky@oracle.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; Format="flowed" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: virtualization-bounces@lists.linux-foundation.org Errors-To: virtualization-bounces@lists.linux-foundation.org To: Andy Lutomirski , Brian Gerst Cc: Konrad Rzeszutek Wilk , "linux-kernel@vger.kernel.org" , Linux Virtualization , Ingo Molnar , David Vrabel , Andrew Lutomirski , "H. Peter Anvin" , "xen-devel@lists.xenproject.org" , Thomas Gleixner , Borislav Petkov List-Id: virtualization@lists.linuxfoundation.org On 11/18/2015 03:58 PM, Andy Lutomirski wrote: > On Wed, Nov 18, 2015 at 12:50 PM, Brian Gerst wrote: >> >> Can you just add !xen_pv_domain() to the opportunistic SYSRET check >> instead? Bury the alternatives in that macro, ie. >> static_cpu_has(X86_FEATURE_XENPV). That would likely benefit other >> code as well. > We could, but that won't help the 64-bit case where we want to keep > the full asm path. I don't think I understand what you mean here. Which full asm path? -boris