Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp138870imu; Mon, 26 Nov 2018 08:57:11 -0800 (PST) X-Google-Smtp-Source: AFSGD/VbauSH2c+gEmHDk1l3dT63vz2VTAKWqrJ/Ui22gbla5s/dirFQ4I0gk9mJW1Vz0mwKOCKv X-Received: by 2002:a17:902:820d:: with SMTP id x13mr29155933pln.229.1543251431555; Mon, 26 Nov 2018 08:57:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543251431; cv=none; d=google.com; s=arc-20160816; b=H9K1rnXs2ozdWAS3XXdHS6UYroqo3mzDq6cJJEyFT5iDfNIXyITsv3u/g4JeO+Wchq 3aWTUln1baYtF8ULdId04TgnhmkjZEZAknvBmr4O0UlEdGdBUtcNHfPsOdi8orK0NRsp aiXnQvX7/PH2LCoaSoA1hJ4O6mdKVO2vc1zrJh1ZRqtqwAvkLhczXYwGnbOBllt6YgWX olEjxN44Tk9Fsk32VhtYB0NlGdghtO+g8ZoBSetVrqdIfEDshYSNPXgp8ojYTWOR27Z3 GBm35Yc3XupxtGBPwp0m5cJYLw6we2gThb8M9JIvhWMyQsQfJmJMc3LGPcCnQ/VnabAP 3NIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=rGjk6e6/pUrl6zaOgH8WvQXEYRG547vFCcK6y+TeBHQ=; b=Dl3Bbd2sklNka8MTK7RyxZuwBa3gDam5tRccSPaqFrcCEtXkiaJ9aS8qg6jgF/DJF9 poRpjPSP6W0HprFYaFh3LQxTgLQ+Dws+Ta6mU6IgJR58IsJTNuBEvfNTVVBdlKPTUFrb sfL9L8v21GqHP/YHqVQCsqX98PfQTtcvJeutdHZaGYvqx87dAnlZFgXZYoIcF31+i7WI TcufFIDuG+4n1ZC7vUuhYxVS4m5fEu1Y/85k0gW1Vu7DKzzM5hgv7i0lMS4wL9Pvhvi7 EWnDfiItCsOfuSyjgypKvER+RkaNGN9ddSxHqBRc05hrXrO9mDGOWDss5OkLAdVI2CYK H9Dw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=L5bpdVCl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q10si756531pll.221.2018.11.26.08.56.00; Mon, 26 Nov 2018 08:57:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=L5bpdVCl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726922AbeK0DtD (ORCPT + 99 others); Mon, 26 Nov 2018 22:49:03 -0500 Received: from mail-wm1-f67.google.com ([209.85.128.67]:54881 "EHLO mail-wm1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726255AbeK0DtC (ORCPT ); Mon, 26 Nov 2018 22:49:02 -0500 Received: by mail-wm1-f67.google.com with SMTP id z18so4298176wmc.4; Mon, 26 Nov 2018 08:54:20 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:to:cc:subject:date:message-id:in-reply-to:references; bh=rGjk6e6/pUrl6zaOgH8WvQXEYRG547vFCcK6y+TeBHQ=; b=L5bpdVClYXnbSFAriAkpMhV+Qq7DOcjyUfh3N0iO5dPb+KLFYp8N0agNpFOmuc/3uN /tIINaTm9iAmye+ltNADgk0Kax49DeJFr5Ak9OISYHJVGaHze1xVBNmCqBrMxuQc3T60 ldhzPY+r+yVZM4vkBBLIV+k7tZnfUoGa8h+wKt9tb2vwugurbC92rMLZDiegC14gPmFe dFs7F3OmanpPmSUw2Iq5zdcKCg3PZrlp6aDflyEzQFXivDQbUDZ1C7kGncWki814M2Tf zICLSYIAMlyMPWNiaUvfRxwb4x2qohzwtTGK1vPzATy1Im4yLoQoEm6zkX7AzT3ntcrJ wUDw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:cc:subject:date:message-id :in-reply-to:references; bh=rGjk6e6/pUrl6zaOgH8WvQXEYRG547vFCcK6y+TeBHQ=; b=BuklWIh+7eIMm1BXK4/Y7sHFFqUQAVEY4KXWLuxjWmTC/EZw79d+1DZhSFY+v+anB7 zQ42aZR6e7DNA7XZND9QCs1bqIJUHoLXLerCO8nLZlUHZJ6Ihy1NDIWDGWEH/lMAmplB sb6FbLPWLQRXtSF5TAs9H1Me/hGd10gG1jO7A8wiEdp0iENMIcsa3wNoTfEWkAl7IBqW dcwAAjT3ySccBeRoSeVRhBi4N+nlRuuTOz+opPyGDfiE1vjedgZuttRj3KAdJOJRbDyV aVC7oVlaQNR4LUpUyb2dZwE0AxNhT0LYPWyTss3yTYgj92TOf4K6ipfvHRbJ0fhnyJKt ESzg== X-Gm-Message-State: AA+aEWbqUc3cVxCSLMH+Gqc6944oVAMI57FyEINR9k/d9vOzLq2JxVam ZTTtVszHlY4VAmI84zsWZlFbJ5CZ X-Received: by 2002:a1c:8f06:: with SMTP id r6mr15973611wmd.65.1543251259275; Mon, 26 Nov 2018 08:54:19 -0800 (PST) Received: from 640k.lan ([93.56.166.5]) by smtp.gmail.com with ESMTPSA id w8sm979240wrv.7.2018.11.26.08.54.17 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 26 Nov 2018 08:54:17 -0800 (PST) From: Paolo Bonzini To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: Junaid Shahid , Xiao Guangrong Subject: [PATCH 2/3] kvm: rename last argument to kvm_get_dirty_log_protect Date: Mon, 26 Nov 2018 17:54:12 +0100 Message-Id: <1543251253-24762-3-git-send-email-pbonzini@redhat.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1543251253-24762-1-git-send-email-pbonzini@redhat.com> References: <1543251253-24762-1-git-send-email-pbonzini@redhat.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When manual dirty log reprotect will be enabled, kvm_get_dirty_log_protect's pointer argument will always be false on exit, because no TLB flush is needed until the manual re-protection operation. Rename it from "is_dirty" to "flush", which more accurately tells the caller what they have to do with it. Signed-off-by: Paolo Bonzini --- arch/mips/kvm/mips.c | 6 +++--- arch/x86/kvm/x86.c | 6 +++--- include/linux/kvm_host.h | 2 +- virt/kvm/arm/arm.c | 6 +++--- virt/kvm/kvm_main.c | 6 +++--- 5 files changed, 13 insertions(+), 13 deletions(-) diff --git a/arch/mips/kvm/mips.c b/arch/mips/kvm/mips.c index 1fcc4d149054..3898e657952e 100644 --- a/arch/mips/kvm/mips.c +++ b/arch/mips/kvm/mips.c @@ -1004,14 +1004,14 @@ int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log) { struct kvm_memslots *slots; struct kvm_memory_slot *memslot; - bool is_dirty = false; + bool flush = false; int r; mutex_lock(&kvm->slots_lock); - r = kvm_get_dirty_log_protect(kvm, log, &is_dirty); + r = kvm_get_dirty_log_protect(kvm, log, &flush); - if (is_dirty) { + if (flush) { slots = kvm_memslots(kvm); memslot = id_to_memslot(slots, log->slot); diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index dc902e5139c2..ff6a8411a15c 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -4410,7 +4410,7 @@ static int kvm_vm_ioctl_reinject(struct kvm *kvm, */ int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log) { - bool is_dirty = false; + bool flush = false; int r; mutex_lock(&kvm->slots_lock); @@ -4421,14 +4421,14 @@ int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log) if (kvm_x86_ops->flush_log_dirty) kvm_x86_ops->flush_log_dirty(kvm); - r = kvm_get_dirty_log_protect(kvm, log, &is_dirty); + r = kvm_get_dirty_log_protect(kvm, log, &flush); /* * All the TLBs can be flushed out of mmu lock, see the comments in * kvm_mmu_slot_remove_write_access(). */ lockdep_assert_held(&kvm->slots_lock); - if (is_dirty) + if (flush) kvm_flush_remote_tlbs(kvm); mutex_unlock(&kvm->slots_lock); diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h index 54cc06dd7e6c..8c56b2873b13 100644 --- a/include/linux/kvm_host.h +++ b/include/linux/kvm_host.h @@ -753,7 +753,7 @@ int kvm_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log, int *is_dirty); int kvm_get_dirty_log_protect(struct kvm *kvm, - struct kvm_dirty_log *log, bool *is_dirty); + struct kvm_dirty_log *log, bool *flush); void kvm_arch_mmu_enable_log_dirty_pt_masked(struct kvm *kvm, struct kvm_memory_slot *slot, diff --git a/virt/kvm/arm/arm.c b/virt/kvm/arm/arm.c index 23774970c9df..120a2663dab9 100644 --- a/virt/kvm/arm/arm.c +++ b/virt/kvm/arm/arm.c @@ -1205,14 +1205,14 @@ long kvm_arch_vcpu_ioctl(struct file *filp, */ int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log) { - bool is_dirty = false; + bool flush = false; int r; mutex_lock(&kvm->slots_lock); - r = kvm_get_dirty_log_protect(kvm, log, &is_dirty); + r = kvm_get_dirty_log_protect(kvm, log, &flush); - if (is_dirty) + if (flush) kvm_flush_remote_tlbs(kvm); mutex_unlock(&kvm->slots_lock); diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index 2d842fd20cd3..b1eae5394411 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c @@ -1154,7 +1154,7 @@ int kvm_get_dirty_log(struct kvm *kvm, * */ int kvm_get_dirty_log_protect(struct kvm *kvm, - struct kvm_dirty_log *log, bool *is_dirty) + struct kvm_dirty_log *log, bool *flush) { struct kvm_memslots *slots; struct kvm_memory_slot *memslot; @@ -1181,7 +1181,7 @@ int kvm_get_dirty_log_protect(struct kvm *kvm, memset(dirty_bitmap_buffer, 0, n); spin_lock(&kvm->mmu_lock); - *is_dirty = false; + *flush = false; for (i = 0; i < n / sizeof(long); i++) { unsigned long mask; gfn_t offset; @@ -1189,7 +1189,7 @@ int kvm_get_dirty_log_protect(struct kvm *kvm, if (!dirty_bitmap[i]) continue; - *is_dirty = true; + *flush = true; mask = xchg(&dirty_bitmap[i], 0); dirty_bitmap_buffer[i] = mask; -- 1.8.3.1