From nobody Tue Apr 7 04:21:20 2026 Received: from mail-ej1-f74.google.com (mail-ej1-f74.google.com [209.85.218.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3E8B833ADA9 for ; Mon, 16 Mar 2026 17:35:40 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.218.74 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773682541; cv=none; b=Erghmyg+l7gYnn3+AVviRnTjsGwIuiNkoo8J0jHXY7LZpffJYd4aPi93kJSobyoDsDezaTZqiFcUP9ch++HjiaDb6FM0hj23vcHzqh1S2OV5lK+YjrtnCJdY+PsEWuocPcpRVmWXLRzXd8HUmR0wxLL6km86aSx7FKBz1pJ2NT8= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773682541; c=relaxed/simple; bh=wJHKHXkfOC+zgH0XBj92cvyVS8NAVEQxbDEUxUyBuI4=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=j9bw6qiDwAiThGG7hWJN24pptk8w++7pcr7Q/S5DjQ9BIykpxL2Ahhlx3T7hoy1wBG3WLlG+d8Y+H7/U4q2NFYbpEFwPJdQYXzJADvY+ZRV8vy7HemhFiNx5Yg8cJtRua2I8o+FwHGazMSRXbdDOVj1fN8haVFLtVmV7huKFRFg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--tabba.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=fVFxk8x3; arc=none smtp.client-ip=209.85.218.74 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--tabba.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="fVFxk8x3" Received: by mail-ej1-f74.google.com with SMTP id a640c23a62f3a-b97a96ce5b8so173362166b.1 for ; Mon, 16 Mar 2026 10:35:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20251104; t=1773682539; x=1774287339; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=XusE5Uw2A71FlWXS54s/a8QC7XzEJTYhsYfjXaXNfDg=; b=fVFxk8x3CtxxdGBjt5EZ/xDpXU/bZ61ViZb7ILsX78o9WXrNxlojtV6CgkF/3MGurZ 1Jh1PgInlccARaSI7scCdvhn7KAKmjXxzn/nzdkBpWujquy9FFmmoNiVMeLirktSjPZx 2VoXRBxCDj8K0Pdq7RST6R9SuASG2SV2sTZc3dl/QvRzG/+ji+JG0bwAWd1PGNuIQtJc wK3LL7zcfpeSHloACVFVnNcwNZ/IDavBUSGCJlPeYDUyb4+4t2ivH+WXbg7ClFvQZSGR MlskupnMiIzwwNLULNmgoa6Jyvn5cXm8eIcANlmHG2qcURTPFDUdq6WnfdctbDxZuGk6 Rs1Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1773682539; x=1774287339; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=XusE5Uw2A71FlWXS54s/a8QC7XzEJTYhsYfjXaXNfDg=; b=ZM58UXbTu9M02rnbn7r34g1+8n65ZLRR57DUqSkZ9hnfo7UxVdyube2C280dIeYn3Y PDyNWHHMPejwWbTzynLEIE/wcEy32vq4/JC9/VcRGfG+O6ogciXXNhyGIBUqw20xKVle 4llwgmunrSQzdgBUsmV4ZzC4SNUTC+wOBTtpSniOLqioJWBD1Kc0WBCLuiJVsNRzAD/d +Dfkdp19TVkY97cWiPQ0QNdPnq4K6VAkFYjuSF5HxLB2Q+h+F28CklHeEkth7N6AeYQT ui9e4HmEHjgRwex5h5mVfVEhPOnHWJzpVHECnAoC7eF0VkBACahxXZDhkN3aRGHSFXWo LlXA== X-Forwarded-Encrypted: i=1; AJvYcCVRa6RvuXVX2l9ZIeL0WqfYJ+7b0bY3aUiPHJJ1hqiyUjOKYGON+bQI2zebE30FLI5fEKjIYXewJU+9QFM=@vger.kernel.org X-Gm-Message-State: AOJu0Yx01+dbuaxRGR7Hsivm8OlpzGMLkWzb3Vqx7kcQDWCBHyNEbcWL Pior7RRD03s9mvxPyZRa5+4syV9XKNusM2Vm2BD3cUCwFMhcHhskITfxC2g0+4aSPWrz8mb4riH IKw== X-Received: from ejcm7.prod.google.com ([2002:a17:906:7c7:b0:b8f:93d4:516f]) (user=tabba job=prod-delivery.src-stubby-dispatcher) by 2002:a17:907:2d07:b0:b97:c313:db30 with SMTP id a640c23a62f3a-b97c313eebamr240677566b.8.1773682538520; Mon, 16 Mar 2026 10:35:38 -0700 (PDT) Date: Mon, 16 Mar 2026 17:35:30 +0000 In-Reply-To: <20260316-tabba-el2_guard-v1-0-456875a2c6db@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20260316-tabba-el2_guard-v1-0-456875a2c6db@google.com> X-Mailer: b4 0.14.3 Message-ID: <20260316-tabba-el2_guard-v1-9-456875a2c6db@google.com> Subject: [PATCH 09/10] KVM: arm64: Use guard(spinlock) in reset.c From: Fuad Tabba To: Marc Zyngier , Oliver Upton , Joey Gouly , Suzuki K Poulose , Zenghui Yu , Catalin Marinas , Will Deacon , "KERNEL VIRTUAL MACHINE FOR ARM64 KVM/arm64" , "KERNEL VIRTUAL MACHINE FOR ARM64 KVM/arm64" , open list Cc: Fuad Tabba Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Migrate manual spin_lock() and spin_unlock() calls managing the vcpu->arch.mp_state_lock to use the scoped_guard(spinlock) macro. This streamlines control flow during vCPU resets by utilizing RAII-style automated unlocking. Change-Id: I32e721e67012c4a141f46b220190bf3c28485821 Signed-off-by: Fuad Tabba --- arch/arm64/kvm/reset.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/arch/arm64/kvm/reset.c b/arch/arm64/kvm/reset.c index 959532422d3a..e229c6885c10 100644 --- a/arch/arm64/kvm/reset.c +++ b/arch/arm64/kvm/reset.c @@ -193,10 +193,10 @@ void kvm_reset_vcpu(struct kvm_vcpu *vcpu) bool loaded; u32 pstate; =20 - spin_lock(&vcpu->arch.mp_state_lock); - reset_state =3D vcpu->arch.reset_state; - vcpu->arch.reset_state.reset =3D false; - spin_unlock(&vcpu->arch.mp_state_lock); + scoped_guard(spinlock, &vcpu->arch.mp_state_lock) { + reset_state =3D vcpu->arch.reset_state; + vcpu->arch.reset_state.reset =3D false; + } =20 preempt_disable(); loaded =3D (vcpu->cpu !=3D -1); --=20 2.53.0.851.ga537e3e6e9-goog