Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp1365842rdb; Tue, 30 Jan 2024 17:01:54 -0800 (PST) X-Google-Smtp-Source: AGHT+IE7dSa4DPiFjLiPctQoGZ+oYWenG8JfQ2n2FEEisiT+vOG3skenj85Py4hXNdOW8Qd/V4Kp X-Received: by 2002:aa7:888a:0:b0:6db:d95a:7d50 with SMTP id z10-20020aa7888a000000b006dbd95a7d50mr359414pfe.17.1706662913799; Tue, 30 Jan 2024 17:01:53 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706662913; cv=pass; d=google.com; s=arc-20160816; b=PAazv3I8kbYODYSmInSZ1iF3kKv62y5pkcqOQHlWKQy1zx30N/58pB7DqoCBXzeeDf uduho33Yb3CWwm/5M528gRfFTui50S6twHnfR5UbaOVLuvLkqW/xtbkzgOYJi8fBWMNL MHo6FQa7R364fipXo3u4y9+xQUdY8su8Tc7aXfyYwd+/6LIfVXC91LIQOaoYbhKidCkg 6aD83f0VAcnzmNoFqybeouLZ+qnK+hNEGtUAEdMTuFV76EOxP51ygDKl49K/rLw67kBK KfjuQrBXiJc0udSwzKWtg0wGiGXdPe2oCpY5ztSZdPigxQNtV6PlyFe5XSrW0CGUSd3R Y6WQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:from:subject:message-id:references:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:in-reply-to:date :dkim-signature; bh=90q1CdG4fldsEQKSI5ABvCuyjkkZoVa1ihGQCUX71GE=; fh=4g9cMUblvfx6/BqmADtV9UIhnMEJCZ2RcMAcBhDUqsk=; b=Omd7BxL+/2QFnF06n4eJI2J2anduZBDztBjSgAt5muo0AxdRrXbAkUmYoGseN9ZH3b wsek+RGnyV2+oQT8vgiMl/355XHria+fSAYhTDzNSPR3bbq+KD3WHD2ty4A+bkbYkcLv vjKHLs1CTh5WYL31awACDiqV1AMJD/TSX5fu2DKLCNetYeIWpbFNoqPzk4fVUGOkZBna b2BpE8PQTs0RK8fNcUv1+rmEP67A6BK0DCRzaiYYpc51kxq/qK8wFSvrQ1M0df7Ehv48 wXLAF2OZ6z54uOHvVotPNsBGGLs34tdED4IuiYxQOTAMj028NE4yYCndcUS6JXXWQkz2 AIMg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=VUfHScXT; arc=pass (i=1 spf=pass spfdomain=flex--seanjc.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-45558-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-45558-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com X-Forwarded-Encrypted: i=1; AJvYcCWytYgzRPiFA5v3fqZ8FaLdwCoz0fQGvOYj4qauYKpr3JnN/OLKu5zCn0AkvL6oJWxfBUkrDwu/ULoVJfJw73k/mN1nI/e+rB1xnsjtcA== Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id p7-20020a625b07000000b006dddf6290cfsi8190328pfb.392.2024.01.30.17.01.53 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 30 Jan 2024 17:01:53 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-45558-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=VUfHScXT; arc=pass (i=1 spf=pass spfdomain=flex--seanjc.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-45558-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-45558-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 6BF72B258D2 for ; Wed, 31 Jan 2024 01:00:24 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 74F5CE546; Wed, 31 Jan 2024 00:59:40 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="VUfHScXT" Received: from mail-yb1-f202.google.com (mail-yb1-f202.google.com [209.85.219.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 25A28CA68 for ; Wed, 31 Jan 2024 00:59:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.219.202 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706662779; cv=none; b=MPCCfPU59aYYliS3oryyu1pgIJExvoDhNmFpf0H0q7a3YfJSug6Qef3cqg6kBq9B9RcBqNnRdRgUPXrpaQxeuq/RztMvuzgFZrhiuqVi6kdlgPB9iLs7jlDBnBOjSsvNopRX3J7bE0U9/81lFmh6NfV7covx3hd5vVwEHnyow2Y= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706662779; c=relaxed/simple; bh=a3e/knvwUFk/+6p5cl7jRlVgDjdA27E0WtmF3pWVYY4=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=iQMJDYqoRFhif8Nc/C63EyzQjUZL2DTd48dbMZJpISJ9xShv20xp41fI2Ob6HnqzJFWMVC4gH1xBr8MaymH61fx1VKwHKR5hq7Ju9cQ9VpveFDbd10kDtaB4zBCinOX9o48rkZKYKJhi5yqGXwCMWRBOjYZrASRb5Cu+T2DEy1M= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=VUfHScXT; arc=none smtp.client-ip=209.85.219.202 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Received: by mail-yb1-f202.google.com with SMTP id 3f1490d57ef6-dc6b9f4a513so547780276.3 for ; Tue, 30 Jan 2024 16:59:37 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1706662777; x=1707267577; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=90q1CdG4fldsEQKSI5ABvCuyjkkZoVa1ihGQCUX71GE=; b=VUfHScXT3+I0J12CRw46xSJD004xfPga3yr91FA3yXgQ/LPMniW6CvjVqG6Lw3QPo7 6a3ED77HNLVgnOBQA2rv2VjPEuyYM/SAkZxHF5y5TKbrAwICpFYKMomHvWM+NnHL2/bE It8wb1monj9TviHsJFB/MXn/OQb2hroqsdnhaI8J5u+PaHtw3JS/JVLVxJ1lwYuOJ6uh 94PA9/IscSa4r0s3ZIdq5LsjGIFybx7VdO4LpKIl8RdNeUpdJkx/ihFrGBhG9VXu2WhN UhONZfHn11pychJPEQaTESAjEm2TyaB0EL1tj/649lI3aeonW5xDZstxtmWIToezwcwz WNrQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706662777; x=1707267577; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=90q1CdG4fldsEQKSI5ABvCuyjkkZoVa1ihGQCUX71GE=; b=YHlcz5i8zv8PfCzuOfTzgNgHcR16G5hN0Ivj7DyUTDqgpgIh5icg+Vs/urEiNLCw7Q bGJjd2KsTc5Xrr2eVUtWnT/7zbfeeGKXlbgkuNrF0L7zNdLMPwbVQeaaZ8thKNx4X6Lj TlPHKV8i0QoGrspNqEJPYGcmfsYWextmRWjt6oA49a2+Zh59Ql8/7Em4PggrcvjpqTeX 90oOmpIOFOJvuVlZI0eZcM3HUNbiNDS32IBAabDWYCTHjbqmWZ5IoAolD3oh19mWHO+F dBAzcjNLCiGxxY3Lq3eJxvgtFl+M3YcIbOKlsqR8DMHLMjDJ3CSMIaAeTXVEBJOxdc4i 8ZXQ== X-Gm-Message-State: AOJu0YyxpVMisciN1ybwAdcaJzWxRhfvD/hOnoSAtfif64U70OOk7SXq EdgwT6Xrtkde+uqkG2msG8W696rSiaWHlqLYeNdwqcZmcqdJ+o9hR/c0yf20C7UJKJvDm4D6Yx7 wvA== X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a05:6902:2687:b0:dc6:2054:fc89 with SMTP id dx7-20020a056902268700b00dc62054fc89mr66813ybb.0.1706662777130; Tue, 30 Jan 2024 16:59:37 -0800 (PST) Date: Tue, 30 Jan 2024 16:59:17 -0800 In-Reply-To: <20231030141728.1406118-1-nik.borisov@suse.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20231030141728.1406118-1-nik.borisov@suse.com> X-Mailer: git-send-email 2.43.0.429.g432eaa2c6b-goog Message-ID: <170629109916.3097852.3849458152684678421.b4-ty@google.com> Subject: Re: [PATCH] KVM: x86: User mutex guards to eliminate __kvm_x86_vendor_init() From: Sean Christopherson To: Sean Christopherson , Nikolay Borisov Cc: pbonzini@redhat.com, x86@kernel.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" On Mon, 30 Oct 2023 16:17:28 +0200, Nikolay Borisov wrote: > Current separation between (__){0,1}kvm_x86_vendor_init() is superfluos as > the the underscore version doesn't have any other callers. > > Instead, use the newly added cleanup infrastructure to ensure that > kvm_x86_vendor_init() holds the vendor_module_lock throughout its > exectuion and that in case of error in the middle it's released. No > functional changes. > > [...] Applied to kvm-x86 misc, thanks! [1/1] KVM: x86: Use mutex guards to eliminate __kvm_x86_vendor_init() https://github.com/kvm-x86/linux/commit/955997e88017 -- https://github.com/kvm-x86/linux/tree/next