Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp824369ybt; Wed, 8 Jul 2020 12:37:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyfsNaZzdT5+HmSL0txo1TnDXNGubYI79Hv1+rDiAv0BMD5DrdGyhvWwbmd3o2/FUlB2/WM X-Received: by 2002:a17:906:6b95:: with SMTP id l21mr54453136ejr.32.1594237020641; Wed, 08 Jul 2020 12:37:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594237020; cv=none; d=google.com; s=arc-20160816; b=QWcLKi/QD5Z8tv4y9GPNAImDr1qV0IWa0f1sbEp4cBjNj9oJxxFgEADWrI4Kle1K3+ r1DVFyc3W/o1L7zADDC4m4KJ1zLAiXGNASI5HDEt43DXKeO/ErIPBb+U5pagNXAUIccX 7O0cxxMVnCSuQvy0Iq6B7bJjzdj6CfhwchIwTqdiYiV739GFw6fJa46Su8Vtdcwe0yZB VNaUZyqRaanD03D/zD8geku28GbxebwT4qQQZ/bF1kbTyGVzYQ4vybyPkpk2biqUjFUe xaogUt99pMXlNjOaXUZA271DdwbD5JiuPfqZy/Bx4MK1ReMCGFXYL6lSMPu61nJLpnK1 8Mng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=R2ALy67CtgBF8fDQMZT8Ir08uhC8QFjLGT5DkxROP8I=; b=NGfUWItoaxUBLnCaUc26ozTKc0Fc7oDOlNNBhfwByzXzsGGXCx6YU291S10eECcyEk 4HrCsJBE0xzDrIleKcwzyVvzBhiP8WpfqL6RxDN82Us9b4sGtQvBl5Q442zkBo/aGeEm XF2GrpO4vN7Ah5LurwYDskIIAhgWzo47OL7DEsDhtjOkZdcLyiNA5B/b06NTka78QRuM Xnerdx/fM8tjsWf/klj1RgJ03ILG8jSkimMRrZ0Ez1sM3Ln50JheWMjPkUWxYxM0ZLHH ljd2CvhHgxtWXM9GfVucgP7SGI94s4tOQqLN0V6DjwM2GscVAGktiRg5qIdHW8pW8dA0 ddjg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=EZZutium; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x18si497405ejd.495.2020.07.08.12.36.38; Wed, 08 Jul 2020 12:37:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=EZZutium; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726353AbgGHTfO (ORCPT + 99 others); Wed, 8 Jul 2020 15:35:14 -0400 Received: from us-smtp-delivery-1.mimecast.com ([207.211.31.120]:39968 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726196AbgGHTe1 (ORCPT ); Wed, 8 Jul 2020 15:34:27 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1594236866; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=R2ALy67CtgBF8fDQMZT8Ir08uhC8QFjLGT5DkxROP8I=; b=EZZutiumfZvzjn8RNVzxfEF1kJWBMpFtWLqRLUsS3202EJ6HmvJ+Ec6dxwlMkXM8p8HCIf 0LQ3YHiqaC8nlkW/9sIlrQ937GoSkQc2I0xDpkmKCU14iRuekzUM2SSnTLyrHZewmGqnhw GjF35iN4klQ4fSuOMYNf7rByrJitPOg= Received: from mail-qt1-f200.google.com (mail-qt1-f200.google.com [209.85.160.200]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-413-K4snakq7NXCe2woiy2Teiw-1; Wed, 08 Jul 2020 15:34:24 -0400 X-MC-Unique: K4snakq7NXCe2woiy2Teiw-1 Received: by mail-qt1-f200.google.com with SMTP id e4so33942962qtd.13 for ; Wed, 08 Jul 2020 12:34:24 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=R2ALy67CtgBF8fDQMZT8Ir08uhC8QFjLGT5DkxROP8I=; b=M636sUx7VvPulaPkkGHJOpLzNwrBJ7KX9LHcQJ4OpPvEfuwJ8GRU7aaYp4VwxwmkfX bDLoqmAXj5hKfIY4MVnKZEzZ2ENA2+giUCh1jTMWqHRLx5sXPtWbLJb0FfM4zx+ISKfN yv9SUHcHCNy8ob0jn2vv0SLZCXKEurV41ylDUcBSW4EuLoZztZT1/dK1Hy0Fh5I253vA UgmWOo6BM/uE3HDYwPdqBgKji9gDVTuM4TBfDOAr539XdXGP2fNXgrb8eZecUQlp/vvW cjC7hnsym2PE8Eqd4KoXrf0YdvlAPgT3tAhLE8Z0BFYX9DW1nfY9o0Bj5HpUKNUzH/Qu slyA== X-Gm-Message-State: AOAM531YXUA1VsQ20+KWxA5/lXdTtmPNC3dG4tamETyRYJ3B5yczRDTj 6yuEZFKmJNksf2JaySxJ1T1+tT7bpxaUN+xiIrEeemr9DGSJNtZ16J1ejjDz+l+ZfDsUPF8WVa9 YlUvHVURRUWpUqGhLFWoXjUa2 X-Received: by 2002:a0c:f007:: with SMTP id z7mr12358708qvk.7.1594236864410; Wed, 08 Jul 2020 12:34:24 -0700 (PDT) X-Received: by 2002:a0c:f007:: with SMTP id z7mr12358695qvk.7.1594236864170; Wed, 08 Jul 2020 12:34:24 -0700 (PDT) Received: from xz-x1.redhat.com ([2607:9880:19c8:6f::1f4f]) by smtp.gmail.com with ESMTPSA id f18sm664884qtc.28.2020.07.08.12.34.22 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 08 Jul 2020 12:34:23 -0700 (PDT) From: Peter Xu To: kvm@vger.kernel.org, linux-kernel@vger.kernel.org Cc: peterx@redhat.com, Sean Christopherson , "Dr . David Alan Gilbert" , Andrew Jones , Paolo Bonzini Subject: [PATCH v11 07/13] KVM: selftests: Always clear dirty bitmap after iteration Date: Wed, 8 Jul 2020 15:34:02 -0400 Message-Id: <20200708193408.242909-8-peterx@redhat.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200708193408.242909-1-peterx@redhat.com> References: <20200708193408.242909-1-peterx@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We don't clear the dirty bitmap before because KVM_GET_DIRTY_LOG will clear it for us before copying the dirty log onto it. However we'd still better to clear it explicitly instead of assuming the kernel will always do it for us. More importantly, in the upcoming dirty ring tests we'll start to fetch dirty pages from a ring buffer, so no one is going to clear the dirty bitmap for us. Reviewed-by: Andrew Jones Signed-off-by: Peter Xu --- tools/testing/selftests/kvm/dirty_log_test.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/testing/selftests/kvm/dirty_log_test.c b/tools/testing/selftests/kvm/dirty_log_test.c index 752ec158ac59..6a8275a22861 100644 --- a/tools/testing/selftests/kvm/dirty_log_test.c +++ b/tools/testing/selftests/kvm/dirty_log_test.c @@ -195,7 +195,7 @@ static void vm_dirty_log_verify(enum vm_guest_mode mode, unsigned long *bmap) page); } - if (test_bit_le(page, bmap)) { + if (test_and_clear_bit_le(page, bmap)) { host_dirty_count++; /* * If the bit is set, the value written onto -- 2.26.2