From mboxrd@z Thu Jan 1 00:00:00 1970 From: Suravee Suthikulpanit Subject: Re: [PART1 RFC v3 02/12] KVM: x86: Introducing kvm_x86_ops VM init/uninit hooks Date: Tue, 29 Mar 2016 12:27:28 +0700 Message-ID: <56FA1240.2000600@amd.com> References: <1458281388-14452-1-git-send-email-Suravee.Suthikulpanit@amd.com> <1458281388-14452-3-git-send-email-Suravee.Suthikulpanit@amd.com> <56EBD438.5000702@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset="windows-1252"; format=flowed Content-Transfer-Encoding: 7bit Cc: , , , To: Paolo Bonzini , , , , , Return-path: In-Reply-To: <56EBD438.5000702@redhat.com> Sender: linux-kernel-owner@vger.kernel.org List-Id: kvm.vger.kernel.org Hi Paolo, On 3/18/16 17:11, Paolo Bonzini wrote: > > On 18/03/2016 07:09, Suravee Suthikulpanit wrote: >> >Adding function pointers in struct kvm_x86_ops for processor-specific >> >layer to provide hooks for when KVM initialize and un-initialize VM. > This is not the only thing your patch is doing, and the "other" change > definitely needs a lot more explanation about why you did it and how you > audited the code to ensure that it is safe. > > Paolo > Sorry, for not mentioning this earlier. I am moving the kvm_arch_init_vm() call mainly to go after mutex_init(&kvm->slots_lock) since I am calling the x86_set_memory_region() (which uses slots_lock) in the vm_init() hooks (for AVIC initialization). Lemme re-check if this would be safe for other code. Thanks, Suravee