[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <d54216c8-e936-1ee4-8280-ae5e2b5f0ba7@redhat.com>
Date: Fri, 20 May 2022 17:20:37 +0200
From: Paolo Bonzini <pbonzini@...hat.com>
To: Like Xu <like.xu.linux@...il.com>
Cc: Sean Christopherson <seanjc@...gle.com>,
Jim Mattson <jmattson@...gle.com>,
Vitaly Kuznetsov <vkuznets@...hat.com>,
Wanpeng Li <wanpengli@...cent.com>,
Joerg Roedel <joro@...tes.org>, linux-kernel@...r.kernel.org,
kvm@...r.kernel.org
Subject: Re: [PATCH RESEND v3 11/11] KVM: x86/pmu: Drop amd_event_mapping[] in
the KVM context
On 5/20/22 16:27, Like Xu wrote:
>
>>
>> Apart from patch 3, the series looks good. I'll probably delay it
>> to 5.20 so that you can confirm the SRCU issue, but it's queued.
>
> I have checked it's protected under srcu_read_lock/unlock() for
> existing usages, so did JimM.
>
> TBH, patch 3 is only inspired by the fact why the protection against
> kvm->arch.msr_filter does not appear for kvm->arch.pmu_event_filter,
> and my limited searching scope has not yet confirmed whether it
> prevents the same spider.
Ok, I'll drop it.
Paolo
Powered by blists - more mailing lists