From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id EC7C2C433EF for ; Wed, 4 May 2022 13:41:30 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1350756AbiEDNpE (ORCPT ); Wed, 4 May 2022 09:45:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34702 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1350741AbiEDNo6 (ORCPT ); Wed, 4 May 2022 09:44:58 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 935F524F12 for ; Wed, 4 May 2022 06:41:22 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 3992F619D0 for ; Wed, 4 May 2022 13:41:22 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id BB540C385A8; Wed, 4 May 2022 13:41:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1651671681; bh=jw7zUbrlhazFO3+mVKiDdtJjleKdC7a/rqXJoqbRRpM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=T8Df1X+FRxZQW16keZRhs1DfbXX/QajNJBXsAq3JC/F7pNyFVVguLvW04dqGEzxll 2m7zRulLXO6gmNN1bHwYxpD3NDmymFNRYOtIoQLc7JpdG3dCYVBuk0Xlo0rZg+GEP5 QMmCEum9+S/p8BRdu3eMqaHWtM+YtGqmqsZ5YcDypl9CAyAAhifzZiJP1jLhwn/JR6 EwrS3jmd0SEm+58pbHr/Sz7NQKdozpO98NY9iueHVqBm8z9CuU3K2UQuTxgdt2fIfS DW6XwiOG4fh1W4bzs4cjyO/xNwrHHsysKbdDCqOVWNJEa/hkNpaO+H1C0nWSIfIBOa DxfwWRpGPBy6Q== Date: Wed, 4 May 2022 14:41:13 +0100 From: Mark Brown To: Kalesh Singh Cc: mark.rutland@arm.com, will@kernel.org, maz@kernel.org, qperret@google.com, tabba@google.com, surenb@google.com, kernel-team@android.com, James Morse , Alexandru Elisei , Suzuki K Poulose , Catalin Marinas , Masami Hiramatsu , Peter Collingbourne , Alexei Starovoitov , "Madhavan T. Venkataraman" , Andrew Jones , Keir Fraser , Marco Elver , Kefeng Wang , Zenghui Yu , Ard Biesheuvel , linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 1/5] KVM: arm64: Factor out common stack unwinding logic Message-ID: References: <20220502191222.4192768-1-kaleshsingh@google.com> <20220502191222.4192768-2-kaleshsingh@google.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="JeDypAEY5KrfMCxE" Content-Disposition: inline In-Reply-To: <20220502191222.4192768-2-kaleshsingh@google.com> X-Cookie: Mother is the invention of necessity. Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --JeDypAEY5KrfMCxE Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Mon, May 02, 2022 at 12:12:01PM -0700, Kalesh Singh wrote: > Factor out the stack unwinding logic common to both the host kernel and > the nVHE hypersivor into __unwind_next(). This allows for reuse in the > nVHE hypervisor stack unwinding (later in this series). Reviewed-by: Mark Brown --JeDypAEY5KrfMCxE Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAABCgAdFiEEreZoqmdXGLWf4p/qJNaLcl1Uh9AFAmJygngACgkQJNaLcl1U h9Bnigf/SrnKbQKJZQjo1OskfncvQ0A42sToBqNL5kFNTNT7vFVbZwv1bx3TllPk HvffoX8n/CrQ3ly+MQjLaS2sLBmjn/pHC735ihAUGl8O/UtYP3T0A90WK28Hw+vE yEPVzhzm7fKGIK97QdbVqaKsDZmFifbEFfL51BQpbCZessqwuQq/ZnmvNKg9je0S C6TMpY4yEn9mVEWSS5LBcBYVOlt8O9Kz2gNUA5irxdVcnzTG1iwYmiAO6F3Yv1to OxU+Hnlu+v1lG7ZV4V6+ngrr+RCeSFKEDCGCAlDHnvamwWW7flrIwqAXzP1DzTx+ 1AKWv2X394fnYOpTbckzPzzUV6G7mQ== =/zNs -----END PGP SIGNATURE----- --JeDypAEY5KrfMCxE--