Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4180339pxj; Tue, 15 Jun 2021 17:38:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw8gpjh/lLvxkCMA5h2TIj50UDOOOPl2ddmguvuXu3Ju1qI0IqxhJWcqEWMFEVyYNdgD7Wn X-Received: by 2002:a17:906:4483:: with SMTP id y3mr2361905ejo.92.1623803892440; Tue, 15 Jun 2021 17:38:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623803892; cv=none; d=google.com; s=arc-20160816; b=xzA7qz1NDBy01h0DEPRHKIo4vTaLxxy8Sx6Z6yihI1IefJGRg4hDsnbD6t0GBZTLq/ CO5nNYKY/1+PadK2ScDqtn/rNZ0OdTUaYDqiCRlamjcx6IIMI8er2TC6jMwkWrqDkGnL cvQ4+DYSLlgfIusrUjYSUD1Ofdmhnt7L3QLShfca3q9OfRzdfW3mrj+AB2DQkH32GibE 5kSDbx6csEP43LKeaHrdzra1yXG0AN8hbdlsTfQ2YsRDd/mhbPZHluEKVQdF87klWppt fUkmK7FAOLveOhp6yx+edsA5Qs4Xz22DIA9Qw9AZGPApEQFA2LsrX/Kgi2R8pkGm/IUF 0Dgw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:ironport-sdr:ironport-sdr; bh=gWIPje9d9kbDIsfEkv1YM5wYQ8c+YeI52o36W9kYXxg=; b=ddcn52paoovTzYV+KgxHerZiSR7oZAx5O19FyN4YGAqMKR+Cl6oRV58xF2/ZlfPmBd 3vbDkk30G/vDp2Q8Hbc88ZMOIZ/UDOedwRDA6oPtN2Yddj3UV8FuC/kzPXzFPoxWkLMK QKwxE26exBsP5kjE7ZQ2dsaMA37tOx9iJFK+8R+GNTy6Oi3T4DrXH+3XyJ9i1Y0y8zNk xIviklsw/nvYPg4Shadeu8RgQUeEI3JfVZZW9lbDo9GLUwt6K9P6PJGzwaFK0LaLDWMv DIQdbWyOa2KcVbxXmeinlxBh2zUlwVyK/Efa7Ce/qHxVupVjKVRSzyz6i+w6FFkBW4fM Kfug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v23si386974edx.578.2021.06.15.17.37.50; Tue, 15 Jun 2021 17:38:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231307AbhFPAiz (ORCPT + 99 others); Tue, 15 Jun 2021 20:38:55 -0400 Received: from mga01.intel.com ([192.55.52.88]:22893 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230244AbhFPAiz (ORCPT ); Tue, 15 Jun 2021 20:38:55 -0400 IronPort-SDR: tyIwjpMfYdw8fli73qKOYRqWPzWgr3hPeA+KWE0GVU1kIBGaKM4VDw7kEb5QbUeF3Pntz0LtPw 1B4DYobh7hHw== X-IronPort-AV: E=McAfee;i="6200,9189,10016"; a="227578459" X-IronPort-AV: E=Sophos;i="5.83,276,1616482800"; d="scan'208";a="227578459" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Jun 2021 17:36:50 -0700 IronPort-SDR: IUW+IbsdJrn5LO+okM2ePmFUC8DyNuW2n//StC1Zwjxyk42X2Bkrgx2Zuy829uF4II9aJ4WLTC 6l0LFW3sV1/g== X-IronPort-AV: E=Sophos;i="5.83,276,1616482800"; d="scan'208";a="639825057" Received: from shyvonen-mobl1.amr.corp.intel.com (HELO khuang2-desk.gar.corp.intel.com) ([10.209.5.121]) by fmsmga005-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Jun 2021 17:36:47 -0700 From: Kai Huang To: linux-sgx@vger.kernel.org, x86@kernel.org Cc: linux-kernel@vger.kernel.org, bp@alien8.de, seanjc@google.com, jarkko@kernel.org, dave.hansen@intel.com, tglx@linutronix.de, mingo@redhat.com, Yang Zhong , Kai Huang Subject: [PATCH v2] x86/sgx: Add missing xa_destroy() when virtual EPC is destroyed Date: Wed, 16 Jun 2021 12:36:34 +1200 Message-Id: <20210616003634.320206-1-kai.huang@intel.com> X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org xa_destroy() needs to be called to destroy virtual EPC's page array before calling kfree() to free the virtual EPC. Currently it is not called. Add the missing xa_destroy() to fix. Fixes: 540745ddbc70 ("x86/sgx: Introduce virtual EPC for use by KVM guests") Tested-by: Yang Zhong Acked-by: Dave Hansen Signed-off-by: Kai Huang --- v1->v2: - Fixed typo in commit msg - Added Dave's Acked-by --- arch/x86/kernel/cpu/sgx/virt.c | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/x86/kernel/cpu/sgx/virt.c b/arch/x86/kernel/cpu/sgx/virt.c index 6ad165a5c0cc..64511c4a5200 100644 --- a/arch/x86/kernel/cpu/sgx/virt.c +++ b/arch/x86/kernel/cpu/sgx/virt.c @@ -212,6 +212,7 @@ static int sgx_vepc_release(struct inode *inode, struct file *file) list_splice_tail(&secs_pages, &zombie_secs_pages); mutex_unlock(&zombie_secs_pages_lock); + xa_destroy(&vepc->page_array); kfree(vepc); return 0; -- 2.31.1