Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3947402pxj; Mon, 21 Jun 2021 10:00:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw+UmdvB2kjmbyJxUP4eS/m7NNdnkzJ27u0Q3ClYOLvh7MjDb9XPRnqF/D2QLqX24opDBCP X-Received: by 2002:a05:6402:1103:: with SMTP id u3mr22947174edv.342.1624294826905; Mon, 21 Jun 2021 10:00:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624294826; cv=none; d=google.com; s=arc-20160816; b=MJlm7ugc37H8kPJPoT/IEcmh7r2AmiQpmH61SX21acqhsqegHANN6By13SPM8zbmDx WeK2iUqXP0MI3AFrbFp6Jxn1LHyWJEh2ysYPFkEUrtksVoCId7RVsl4H+PdjN3U0X4J+ sUHJTYdtgMnAYKQ1U/78QbDhR0oP+ymwyoZ0/NM3/4KOXgj4aVLeCo0EszgzjHA0pM0S Q5BgWkYCDdcqYLY2zQ5oCELvMJSrcDxka55SwyTIaH8h050u5RJfFNIEGhppxs7W5u0b GRYObcIfjloF+ihaJIis70azgvp6+a1VlpFiqMNpkx+7RQ3hgBhPRItzDTgfg1cuHfjk 7r/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:dkim-signature; bh=Fh4N55vsJGr/owgyo59+w03kBoNEzSNeOYDe9RDAnqA=; b=0vTsig6yNa5hi3u5ntUd2Q46Gpl8/6ABm4aJ0IqVp0USFm1A1rAvtr8pCwwxy6Zqqz xxFWblgxRI/1jvP+na+UDyQNjvSA2VGHLZ5YzYlXsqG12aArY1AfcWSRpCziz9R4bIlI 5PsRd9yec1Md9UjHFHZy0+QlVH3MjSCtO+QnG6I7L/od/bFoKjNILmnYvd9pSllmX1Pn PaD3kC0z/ckni45lItyoB2aZrWa5IiHMTrEp+QwgWBgfAQW1uBqyvlwfKdpMcVgYgRI2 eJ2ltkpbCuqla+NIFmjgPopraGWv/goAwVFgLwNnCSMN7PFoxqOCCh5KwIP/osmZaJlr 0EGQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=NztFXzrO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s13si18099444edr.184.2021.06.21.10.00.04; Mon, 21 Jun 2021 10:00:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=NztFXzrO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232400AbhFURBI (ORCPT + 99 others); Mon, 21 Jun 2021 13:01:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35858 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232398AbhFURAy (ORCPT ); Mon, 21 Jun 2021 13:00:54 -0400 Received: from mail-qt1-x84a.google.com (mail-qt1-x84a.google.com [IPv6:2607:f8b0:4864:20::84a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 33D7BC0A2F83 for ; Mon, 21 Jun 2021 09:31:32 -0700 (PDT) Received: by mail-qt1-x84a.google.com with SMTP id h10-20020ac87d4a0000b029024eccb9d079so4364662qtb.1 for ; Mon, 21 Jun 2021 09:31:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=Fh4N55vsJGr/owgyo59+w03kBoNEzSNeOYDe9RDAnqA=; b=NztFXzrOAUEp0IO07vkl0QNPtHvTIOd1gMWUm52bht+wYI2WLBSRkIp2KSCTakma8o wmNUNMlRrsbvpQ5W4lWjUcI3DdF9pqnqDhcHuhiGIJy5fUrkoilLAClHvL1xWIAVUibj b9HYvax/cp82xsqKmWoKWdSuKCMZvwGg7cK/7iBXpqOLe0M7dhZfHgW7Wwcsm9B12xJc cups2bHdRZEHQt0hf70ASS/7Bso0YwYvp/Rt0pIlX+dqWml775joSlylHx9YrcFQKvR4 T1wx7oDA1W/nLUIA0yVM1Nb6tW8+Lsls4wadWBjKIN+0whiWv95b7Y4eX1Cpixg+t9G9 0ceA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=Fh4N55vsJGr/owgyo59+w03kBoNEzSNeOYDe9RDAnqA=; b=uidf9B5B0WjnpD+TU+joSTCEu7rSQ3nenCQVnli9mVeJRBK+283k0sRC8+CKS5gHbG 5XIkMLPtlpS3OEZ8xJekjEyTPziamG3PE/zoXLmx84wpmDDubdj41fiJH2+FYoi7lZz7 ZWZOgM8DW66ipZxoPirOO3aAAYSWg8xxqB1X/lhD+oKy/i3Ctbvz2uae4KDbyTAy+o0p /hhaAVayEpkIZetTqoyRlbzO0Yc/oDNQFa81nuvnTARyRfp5ukuUZIXma402DQnKp/Dp 9SXXFMsdlHGfAkqI24L3g1W+OfwOy5jkK9L/XGbEB4RbuUmIeIZiGNyULvEL8crRZ0uK G40A== X-Gm-Message-State: AOAM5303uusQunqMP6Z5ypwoTH12EA5JMXTYn60O9p5ra3clC1wd/Jq2 evnzqDIj9svcZDAQYrGSqqaGVV2W4/I= X-Received: from pgonda1.kir.corp.google.com ([2620:0:1008:11:2742:338c:f077:6d85]) (user=pgonda job=sendgmr) by 2002:a25:d694:: with SMTP id n142mr33012654ybg.349.1624293091163; Mon, 21 Jun 2021 09:31:31 -0700 (PDT) Date: Mon, 21 Jun 2021 09:31:16 -0700 In-Reply-To: <20210621163118.1040170-1-pgonda@google.com> Message-Id: <20210621163118.1040170-2-pgonda@google.com> Mime-Version: 1.0 References: <20210621163118.1040170-1-pgonda@google.com> X-Mailer: git-send-email 2.32.0.288.g62a8d224e6-goog Subject: [PATCH 1/3] KVM, SEV: Refactor out function for unregistering encrypted regions From: Peter Gonda To: kvm@vger.kernel.org Cc: Peter Gonda , Paolo Bonzini , Sean Christopherson , David Rientjes , "Dr . David Alan Gilbert" , Brijesh Singh , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Factor out helper function for freeing the encrypted region list. Signed-off-by: Peter Gonda Cc: Paolo Bonzini Cc: Sean Christopherson Cc: David Rientjes Cc: Dr. David Alan Gilbert Cc: Brijesh Singh Cc: Vitaly Kuznetsov Cc: Wanpeng Li Cc: Jim Mattson Cc: Joerg Roedel Cc: Thomas Gleixner Cc: Ingo Molnar Cc: Borislav Petkov Cc: "H. Peter Anvin" Cc: kvm@vger.kernel.org Cc: linux-kernel@vger.kernel.org --- arch/x86/kvm/svm/sev.c | 26 +++++++++++++++++--------- 1 file changed, 17 insertions(+), 9 deletions(-) diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c index 46e339c84998..5af46ff6ec48 100644 --- a/arch/x86/kvm/svm/sev.c +++ b/arch/x86/kvm/svm/sev.c @@ -1767,11 +1767,25 @@ int svm_vm_copy_asid_from(struct kvm *kvm, unsigned int source_fd) return ret; } +static void __unregister_region_list_locked(struct kvm *kvm, + struct list_head *mem_regions) +{ + struct enc_region *pos, *q; + + lockdep_assert_held(&kvm->lock); + + if (list_empty(mem_regions)) + return; + + list_for_each_entry_safe(pos, q, mem_regions, list) { + __unregister_enc_region_locked(kvm, pos); + cond_resched(); + } +} + void sev_vm_destroy(struct kvm *kvm) { struct kvm_sev_info *sev = &to_kvm_svm(kvm)->sev_info; - struct list_head *head = &sev->regions_list; - struct list_head *pos, *q; if (!sev_guest(kvm)) return; @@ -1795,13 +1809,7 @@ void sev_vm_destroy(struct kvm *kvm) * if userspace was terminated before unregistering the memory regions * then lets unpin all the registered memory. */ - if (!list_empty(head)) { - list_for_each_safe(pos, q, head) { - __unregister_enc_region_locked(kvm, - list_entry(pos, struct enc_region, list)); - cond_resched(); - } - } + __unregister_region_list_locked(kvm, &sev->regions_list); mutex_unlock(&kvm->lock); -- 2.32.0.288.g62a8d224e6-goog