Received: by 2002:a9a:4c47:0:b029:116:c383:538 with SMTP id u7csp1070687lko; Tue, 13 Jul 2021 16:21:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJznUbceLzsunZH/BgFINmxpvoPqHEwjH/xnKfQooA3OLCEjnQhS8MV1n8zd7lTR0v5hKCZz X-Received: by 2002:a05:6402:c96:: with SMTP id cm22mr8814310edb.132.1626218512587; Tue, 13 Jul 2021 16:21:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626218512; cv=none; d=google.com; s=arc-20160816; b=pRHlNGxEcUDAuPyYE8R4RCA2Y3xO1WKyDMaVfwmwzOhYqDxp1qmRM70w43054F7DmK swdEfZ2AU1yNC2+qIlEdfuEK+/M9RfsXN4WIwvRgBRpIWufzPgu6ZxJQuOoXAQzIsqaC OlyvcNQPWc6Ux1H0ATyySdp/kyn/KE7u2v1E3Vl5pq3xdwq1YekJVyJ25Td10/V7Ds1F JW+wcp7wyk16d4mkFvm0sz5aEK/hS1j/ZmlHKaEEHpgeQaCdpRySqvjZdeqzifg4k+iF 8ZIrHY2bmy8Sx5mCh6V4pUV18R/nixrNtM7Y8tvs7WKRsTscNyRY5YqrFaat8dZK/xFe WCJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=X7EKvFIO/8O+BrCmufnPNCIDCKJof7TC2G+GPb281Kk=; b=nr6p23Mb/VkfI9F8NrxA4YiFRYj8e1Ui7zZcxqr6QHt2hJIr9k//8wnZIz2SsDot5K wmDa0ltut+epvKmp4wKbf8KMTzlAc1R4BERooC5Yp7SwQkqX8snU9BBFFibkl4IwZaPg pm2KAkg5MaEl5ykQJkisKaS9VQ6Le1UXeIYTq8tmZ91wEmQWpmtNOq/ohRPaXmgJqajA SZbOfj3aWv0nwGyLED019JHBypHm1fsNi0nku8sr32r+x0GzH3aqoMpOkomNyGUgIRk5 lv+Tsw3+mAIkvV8JUEMBRWt/e1LiF0dziKyI211Rb7xAXAawZXxeGxWYwW3+/W+V9PiA T7rw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=vstfIIXp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id jz5si249174ejb.22.2021.07.13.16.21.27; Tue, 13 Jul 2021 16:21:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=vstfIIXp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236850AbhGMXVH (ORCPT + 99 others); Tue, 13 Jul 2021 19:21:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52050 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236794AbhGMXVG (ORCPT ); Tue, 13 Jul 2021 19:21:06 -0400 Received: from mail-qk1-x729.google.com (mail-qk1-x729.google.com [IPv6:2607:f8b0:4864:20::729]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B5187C0613E9 for ; Tue, 13 Jul 2021 16:18:14 -0700 (PDT) Received: by mail-qk1-x729.google.com with SMTP id r125so15871777qkf.1 for ; Tue, 13 Jul 2021 16:18:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=X7EKvFIO/8O+BrCmufnPNCIDCKJof7TC2G+GPb281Kk=; b=vstfIIXpC66V8Fdf4gXiMzbgUIxqHrQh2s9iRgiZ9eMvf3unWbjSWZwMPPrPq3PUoc +U3DefG4sYEYRyWdjXmqNPwezvTbwnB8pLyu447a9Ev+FEvtCUVXWrIWsgCEHH5o0bOR lRjJUuw7qCUDMXLloWLJjk73ntKVVo+MmURiCiLFzzJujrNkdW1kJTE8IrWukSnbeyca KDn0PEMzOHJ7v3a2eY8SRkY+vzOyweW1FmwPay6axcOT2ZaSgvpve+uMQF1ME/sxoSwW /1jknaGnzrB4/Q+doN97u6uMvaP2DG46u+zSYP3ydM0he47WVyiTEHYCgQSJxL9N7KB3 +1EA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=X7EKvFIO/8O+BrCmufnPNCIDCKJof7TC2G+GPb281Kk=; b=hAHIAs6+2gq6UI839/rhAbp/fXBcz8KMZJp8vpc/5KTL2WMTeupvMZPjOHuxWpK+sW s444ZT05ewDlr3Tp4WxQA8aXFExiA+TzseDoUrirgMKTXgexp6MhTLmZUIBusf6TgogR 7MzyfqPXzdh8bbnwIZLVtq8hVHOJRDPAe1X0dFbvYPGB6RPK1whVkfs5OND+JCQNyBQ5 nDLyGOMYbpyLPibeIaOER3inVdMnOjC+AC2UaEAHjOy46A9mK1k6pymfbN0hOidt7OZu yyMxvemv222Az/OpSWJ15dUzNSa0GzYgVy8YRxOrjlenCamSLPGERrtK3SZyu1rdBb0f xG2w== X-Gm-Message-State: AOAM532KaQerVGIiK/olgQHy3C4lyCvtCKDl/BTBeINxPxiGYPhliDt5 Eii/6ar/JILW7K4GIwx66HBjpz0wPAdOvkK2V4/FCA== X-Received: by 2002:a05:620a:a90:: with SMTP id v16mr6752709qkg.150.1626218293567; Tue, 13 Jul 2021 16:18:13 -0700 (PDT) MIME-Version: 1.0 References: <20210621163118.1040170-1-pgonda@google.com> <20210621163118.1040170-2-pgonda@google.com> In-Reply-To: <20210621163118.1040170-2-pgonda@google.com> From: Marc Orr Date: Tue, 13 Jul 2021 16:18:02 -0700 Message-ID: Subject: Re: [PATCH 1/3] KVM, SEV: Refactor out function for unregistering encrypted regions To: Peter Gonda Cc: kvm list , Paolo Bonzini , Sean Christopherson , David Rientjes , "Dr . David Alan Gilbert" , Brijesh Singh , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 21, 2021 at 9:59 AM Peter Gonda wrote: > > Factor out helper function for freeing the encrypted region list. > > Signed-off-by: Peter Gonda > Cc: Paolo Bonzini > Cc: Sean Christopherson > Cc: David Rientjes > Cc: Dr. David Alan Gilbert > Cc: Brijesh Singh > Cc: Vitaly Kuznetsov > Cc: Wanpeng Li > Cc: Jim Mattson > Cc: Joerg Roedel > Cc: Thomas Gleixner > Cc: Ingo Molnar > Cc: Borislav Petkov > Cc: "H. Peter Anvin" > Cc: kvm@vger.kernel.org > Cc: linux-kernel@vger.kernel.org > > --- > arch/x86/kvm/svm/sev.c | 26 +++++++++++++++++--------- > 1 file changed, 17 insertions(+), 9 deletions(-) > > diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c > index 46e339c84998..5af46ff6ec48 100644 > --- a/arch/x86/kvm/svm/sev.c > +++ b/arch/x86/kvm/svm/sev.c > @@ -1767,11 +1767,25 @@ int svm_vm_copy_asid_from(struct kvm *kvm, unsigned int source_fd) > return ret; > } > > +static void __unregister_region_list_locked(struct kvm *kvm, > + struct list_head *mem_regions) > +{ > + struct enc_region *pos, *q; > + > + lockdep_assert_held(&kvm->lock); > + > + if (list_empty(mem_regions)) > + return; > + > + list_for_each_entry_safe(pos, q, mem_regions, list) { > + __unregister_enc_region_locked(kvm, pos); > + cond_resched(); > + } > +} > + > void sev_vm_destroy(struct kvm *kvm) > { > struct kvm_sev_info *sev = &to_kvm_svm(kvm)->sev_info; > - struct list_head *head = &sev->regions_list; > - struct list_head *pos, *q; > > if (!sev_guest(kvm)) > return; > @@ -1795,13 +1809,7 @@ void sev_vm_destroy(struct kvm *kvm) > * if userspace was terminated before unregistering the memory regions > * then lets unpin all the registered memory. > */ > - if (!list_empty(head)) { > - list_for_each_safe(pos, q, head) { > - __unregister_enc_region_locked(kvm, > - list_entry(pos, struct enc_region, list)); > - cond_resched(); > - } > - } > + __unregister_region_list_locked(kvm, &sev->regions_list); > > mutex_unlock(&kvm->lock); > > -- > 2.32.0.288.g62a8d224e6-goog Reviewed-by: Marc Orr