Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp512726imu; Fri, 7 Dec 2018 04:49:50 -0800 (PST) X-Google-Smtp-Source: AFSGD/UwrmATqMiHWv84b+OQHuVDXwnnn3WHwR51S7Bqr96WG+Z38eG2vLVIdkWSDRNFC+DVj9Kx X-Received: by 2002:a63:3c44:: with SMTP id i4mr1822578pgn.286.1544186990185; Fri, 07 Dec 2018 04:49:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544186990; cv=none; d=google.com; s=arc-20160816; b=ZZG/4xoKIl/i9lW82G3PgsNg0GEHq1gQIEXZw7VpPVCprkf0VmWw7DwLR+6IrivR2g qnhRVY0AQpA5ug8WUUwpHb11bDtdToNihPCOyMLhT3ev9kL+skXdivT8IgcnwQKC9OzU frYV1+Md+kQcVLSOzy9YG9CPLw9uWEwWeLsmE1SRVhnvLA8SS7iQ5kMHCCqeIr6C7bYk 5qO0vCkEp5SxnbosSmueDJydWIJmuLBhs9llkT1VtCdfIko1xmVgIdMUuutnfz/WKTP+ tIVJb1jq+A3v8bPHVyuzoZklHNgUVOpv+XR4c2PbOo1DQ8FrpCHELleoICnHpuNvI7Wp GbEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=DU7M5piB0Rvr3KyQYQ6V1yh0wa36ooPj9QZW0CCD+Y8=; b=n0mBMeRNWT1MpHNQl5xifxwau+nWOp08YPD1QS7syAC9tNZClUKgdGavr/Zk/htdLG XGs6hbxQmGa+8IRcFewY6SH+MWvZZpvDkuwuWwJaZzk1URH0epUrXLayxRrFBHONRnSX JrYGUxCXoDy38i6XodEhN1IVoblb51I/MofrNWjYLDorL2G45ygSmF7Ak1Ngocsm0+hz ZuGYeg4Mvqp3xG/7W0AOz9lArQOW7YwQo54NnaGsn5fHcnwJjoICdFHiFa20k+bWunOC 6RzoekJhR9kr4GYYiUziRTxDvKqT/pdqyEisrq+hB12Kps4VLMwaTaU1VPXvzhkqEOCK Jx9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@mena-vt-edu.20150623.gappssmtp.com header.s=20150623 header.b=cSU1cVB9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=vt.edu Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e68si2941232pfb.101.2018.12.07.04.49.34; Fri, 07 Dec 2018 04:49:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@mena-vt-edu.20150623.gappssmtp.com header.s=20150623 header.b=cSU1cVB9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=vt.edu Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726142AbeLGMsz (ORCPT + 99 others); Fri, 7 Dec 2018 07:48:55 -0500 Received: from mail-wm1-f66.google.com ([209.85.128.66]:50970 "EHLO mail-wm1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726126AbeLGMsy (ORCPT ); Fri, 7 Dec 2018 07:48:54 -0500 Received: by mail-wm1-f66.google.com with SMTP id n190so4313899wmd.0 for ; Fri, 07 Dec 2018 04:48:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mena-vt-edu.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=DU7M5piB0Rvr3KyQYQ6V1yh0wa36ooPj9QZW0CCD+Y8=; b=cSU1cVB9KCuBGlEeWVp6IcB3lNQiouoLV/w/JRBvclbuTZthEsJ6tnxD6hSXO2+4dK 8JC2tibVV0lv6hFG2jpXY+wLTXKpXT9I+ApY51qsiPLsoDJiMeoK3tmPP4cMVE/3Ixsm 2H03FCopLGrTTIfAxUlFP7ndXtBdMJpLqvLXtYrD8Y3P4yh+vvFwT0jMhoghr3VR0h4X Pu3URCe6HknbBOry1QaRvs1P1wAgMKoYJ64hnxjHdmLLVeTyS2xQ96tkKkDqPV6qcOMp VJ98RFEyhkixt/wdsrLjYLlhHEKp0t8I5I0DYqNRsnH01O0uGugvZZHo2Oc76ZSjcXVq CxSw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=DU7M5piB0Rvr3KyQYQ6V1yh0wa36ooPj9QZW0CCD+Y8=; b=MXOyPyinZ2MuPdz3kOC6d3lxdcVKu519t4fFWjL1UR6EaGT8bRPgp9YaSUsrmUmWU4 l9EAPPTl8eEYxkLbIqeF+w4qRtkU7AzSaYb1poXkBkqv9hnWOejZ4lVQB1KeRc+Udc0s +yl8n5Nt2w2OrordRX/VtDyc/GQo/rBf7ZK1x5B0cFQPwedVwyeyTF7nArt6OP16Kdft SDweGp/nyUia8SZatdkErOcP+I0AJJa1DmeQ1m2YdT5/ggcZCSeQR5filyzsAZj4qdZ+ r+mjLd0fqSLwbh3ibrcZ8ZeLPqB0TLmMRZnTNeL8go5yzZRhMPa31SaAb8vFAgbmr0jj dylw== X-Gm-Message-State: AA+aEWYWWn7p5JtPJLuUrtcIOvUo6ne1u9S2EpmzZnbNNwlwKxU6zAHx YKatojIi4Yr7hcFK5xpi6RiW5Q== X-Received: by 2002:a1c:544f:: with SMTP id p15mr2079564wmi.37.1544186932211; Fri, 07 Dec 2018 04:48:52 -0800 (PST) Received: from localhost.localdomain ([156.213.98.90]) by smtp.gmail.com with ESMTPSA id i192sm4362949wmg.7.2018.12.07.04.48.47 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 07 Dec 2018 04:48:51 -0800 (PST) From: Ahmed Abd El Mawgood To: Paolo Bonzini , rkrcmar@redhat.com, Jonathan Corbet , Thomas Gleixner , Ingo Molnar , Borislav Petkov , hpa@zytor.com, x86@kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, ahmedsoliman0x666@gmail.com, ovich00@gmail.com, kernel-hardening@lists.openwall.com, nigel.edwards@hpe.com, Boris Lukashev , Igor Stoppa Cc: Ahmed Abd El Mawgood Subject: [PATCH 01/10] KVM: State whether memory should be freed in kvm_free_memslot Date: Fri, 7 Dec 2018 14:47:54 +0200 Message-Id: <20181207124803.10828-2-ahmedsoliman@mena.vt.edu> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181207124803.10828-1-ahmedsoliman@mena.vt.edu> References: <20181207124803.10828-1-ahmedsoliman@mena.vt.edu> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The conditions upon which kvm_free_memslot are kind of ad-hock, it will be hard to extend memslot with allocatable data that needs to be freed, so I replaced the current mechanism by clear flag that states if the memory slot should be freed. Signed-off-by: Ahmed Abd El Mawgood --- virt/kvm/kvm_main.c | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index 2679e476b6..039c1ef9a7 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c @@ -549,9 +549,10 @@ static void kvm_destroy_dirty_bitmap(struct kvm_memory_slot *memslot) * Free any memory in @free but not in @dont. */ static void kvm_free_memslot(struct kvm *kvm, struct kvm_memory_slot *free, - struct kvm_memory_slot *dont) + struct kvm_memory_slot *dont, + enum kvm_mr_change change) { - if (!dont || free->dirty_bitmap != dont->dirty_bitmap) + if (change == KVM_MR_DELETE) kvm_destroy_dirty_bitmap(free); kvm_arch_free_memslot(kvm, free, dont); @@ -567,7 +568,7 @@ static void kvm_free_memslots(struct kvm *kvm, struct kvm_memslots *slots) return; kvm_for_each_memslot(memslot, slots) - kvm_free_memslot(kvm, memslot, NULL); + kvm_free_memslot(kvm, memslot, NULL, KVM_MR_DELETE); kvfree(slots); } @@ -1063,14 +1064,14 @@ int __kvm_set_memory_region(struct kvm *kvm, kvm_arch_commit_memory_region(kvm, mem, &old, &new, change); - kvm_free_memslot(kvm, &old, &new); + kvm_free_memslot(kvm, &old, &new, change); kvfree(old_memslots); return 0; out_slots: kvfree(slots); out_free: - kvm_free_memslot(kvm, &new, &old); + kvm_free_memslot(kvm, &new, &old, change); out: return r; } -- 2.19.2