Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp513249pxv; Wed, 14 Jul 2021 09:02:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzSAXfmMmwxMMVQipPNZShvumruEKa0vCIU0TwXAiBDJCWjkDQ2FPZesrH6DM+nCVKQrfPM X-Received: by 2002:a05:6638:35a8:: with SMTP id v40mr9840328jal.126.1626278575357; Wed, 14 Jul 2021 09:02:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626278575; cv=none; d=google.com; s=arc-20160816; b=vQZQJnf8akbOpskZw6j3980SN3hzNpSlxXF8QvjVLag04BGE6ZuVEUxoRQK/cdA0gF UrKuqUO1EDTXrUEy4bylV2DQOqFC/dbKJ7Yc63P4RpSdqHYIPwWVoSXJPqdnXh08x/fL OD8qQx9lzxPedkG9eb/3u7RUyprj3YfLAmEaql+akYpF6ZbgK+FzU8LGn2Wm+F1rNiSk VFQubAedITCBsArNr1x2RSR5XKf268FK9pYs4zKTPhW8nEfMVuenpPq6DjDiT0gzNbDm cLlpbZqR2tT8a2OIoGXpIdxyUKhsBvO2oybzqsDfXxtKkNGY66/OSiAlJ8I/oeXbrFG5 KmbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:dkim-signature; bh=ukpFEBQ3ZSOPfYZVcnUGmbU85zNXyRaZS2xqA85qNuA=; b=o23Y1YFlKjreP/I5zYTFnLnJe5fNKdXaUHTro+Lv2DsvBDI7BOJVYEZRWqBAcxtovA gnsTQk2DckD9RwtOgxKBwPkav3sLWTxxjBZ01LQ6e51PCDGvNi80xDKgiImGKYLZdfdb 2ivXK43DkPHTn3zOyjCn6UjUzJLCn/f1Ip++50G+JQH7M6Ypo8aZ3kOnOBZjL1ZzANvy 2/bNwbLgbzj9WjP2VUG2uYhN4Py19FMLfn1EMDu5NcY/LAvQdUuKe74fG8QEKjeT0bPI bCZokAAG0hgsodtD9g0AIo3n2t/bJoLGpi6FXD9Fp1xXXMeEDgZzc6zJMzr8/Re4m0E+ GI8g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=tRgSEEmo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g1si3203843iow.49.2021.07.14.09.02.40; Wed, 14 Jul 2021 09:02:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=tRgSEEmo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239811AbhGNQEx (ORCPT + 99 others); Wed, 14 Jul 2021 12:04:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54444 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239782AbhGNQEw (ORCPT ); Wed, 14 Jul 2021 12:04:52 -0400 Received: from mail-qv1-xf49.google.com (mail-qv1-xf49.google.com [IPv6:2607:f8b0:4864:20::f49]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 51C7DC061760 for ; Wed, 14 Jul 2021 09:02:00 -0700 (PDT) Received: by mail-qv1-xf49.google.com with SMTP id e19-20020ad442b30000b02902dc988b8675so1983808qvr.3 for ; Wed, 14 Jul 2021 09:02:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=ukpFEBQ3ZSOPfYZVcnUGmbU85zNXyRaZS2xqA85qNuA=; b=tRgSEEmo0V/Rf3S07YeK87hz/a7Vmc7RcBcly8NcC+QOXRreSc+UoWK/Lb6dVlLa/o QC9Tghk26QugyI6CBcHFoIaLvfmtJJV/YFO0EcG8ukxjDWSGtSf3LQTuPvHEsdQXAbgX qp4UFTGfO0usrnBkB2ikNwjiotoEc7XlpOd91bFRRr3zYJ/B0NOY6YSAXy6ZBm+DjWi4 ktcNs/UEAWnPgYb0Dh7WIyjxUH00mKJwPV7J2sAHUSImQm6dAlnR6A1TZepBgHleefdd /741/8aAZIf1gI80zQ5+VOQRAZW9KmQLN6jr+ye7f4vq3sOYzuDZb/+o9bbKTUK4PtBV Iouw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=ukpFEBQ3ZSOPfYZVcnUGmbU85zNXyRaZS2xqA85qNuA=; b=k7csufioSctzaWdMNUlsAa2q8T53KeFViqdkVkaUN3OYVrJuKqxvQ1+ewixyjcoTSy Uw5MMIMF6gcleRshjbE/AMU1O/qCjHCKNnaHcb7YvIgC9mZbBJZd80FsyjN/USOIGOwj HT+9dBEQXWbo96Q/0ZpSivJ4jnxx9v++PzQ1TD0c5+6CTMstR9ts5ndmahna5Y8PF8aT RSD6M+bH6wFfnl4ICF1wMJctaqoaeq1EW7tdE3HQFl4kwPM9JKVbjPmrGHx8W9bJ9Yyb xhioDEwrKLdhjA6ENsElKmiE8np+3W1dQUA7ZjtwOVlx797gWkw0IlSfoaZHBQG0GFEn FLXw== X-Gm-Message-State: AOAM5306FTAmYrR3tVxWwl/P833rnUV6KPzOBGqdaG8JXpXiAvJ/Y0Zm xkOg21VAJ0YPVQDYcHPdy5EGOautR0Q= X-Received: from pgonda1.kir.corp.google.com ([2620:0:1008:11:32d8:66d1:672:9aeb]) (user=pgonda job=sendgmr) by 2002:a05:6214:1141:: with SMTP id b1mr11599789qvt.2.1626278519429; Wed, 14 Jul 2021 09:01:59 -0700 (PDT) Date: Wed, 14 Jul 2021 09:01:41 -0700 In-Reply-To: <20210714160143.2116583-1-pgonda@google.com> Message-Id: <20210714160143.2116583-2-pgonda@google.com> Mime-Version: 1.0 References: <20210714160143.2116583-1-pgonda@google.com> X-Mailer: git-send-email 2.32.0.93.g670b81a890-goog Subject: [PATCH 1/3 V2] KVM, SEV: Refactor out function for unregistering encrypted regions From: Peter Gonda To: pgonda@google.com Cc: Brijesh Singh , Marc Orr , Paolo Bonzini , Sean Christopherson , David Rientjes , "Dr . David Alan Gilbert" , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Factor out helper function for freeing the encrypted region list. Signed-off-by: Peter Gonda Reviewed-by: Brijesh Singh Reviewed-by: Marc Orr Cc: Paolo Bonzini Cc: Sean Christopherson Cc: David Rientjes Cc: Dr. David Alan Gilbert Cc: Brijesh Singh Cc: Vitaly Kuznetsov Cc: Wanpeng Li Cc: Jim Mattson Cc: Joerg Roedel Cc: Thomas Gleixner Cc: Ingo Molnar Cc: Borislav Petkov Cc: "H. Peter Anvin" Cc: kvm@vger.kernel.org Cc: linux-kernel@vger.kernel.org --- arch/x86/kvm/svm/sev.c | 26 +++++++++++++++++--------- 1 file changed, 17 insertions(+), 9 deletions(-) diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c index 8d36f0c73071..78fea9c4048d 100644 --- a/arch/x86/kvm/svm/sev.c +++ b/arch/x86/kvm/svm/sev.c @@ -1775,11 +1775,25 @@ int svm_vm_copy_asid_from(struct kvm *kvm, unsigned int source_fd) return ret; } +static void unregister_enc_regions(struct kvm *kvm, + struct list_head *mem_regions) +{ + struct enc_region *pos, *q; + + lockdep_assert_held(&kvm->lock); + + if (list_empty(mem_regions)) + return; + + list_for_each_entry_safe(pos, q, mem_regions, list) { + __unregister_enc_region_locked(kvm, pos); + cond_resched(); + } +} + void sev_vm_destroy(struct kvm *kvm) { struct kvm_sev_info *sev = &to_kvm_svm(kvm)->sev_info; - struct list_head *head = &sev->regions_list; - struct list_head *pos, *q; if (!sev_guest(kvm)) return; @@ -1803,13 +1817,7 @@ void sev_vm_destroy(struct kvm *kvm) * if userspace was terminated before unregistering the memory regions * then lets unpin all the registered memory. */ - if (!list_empty(head)) { - list_for_each_safe(pos, q, head) { - __unregister_enc_region_locked(kvm, - list_entry(pos, struct enc_region, list)); - cond_resched(); - } - } + unregister_enc_regions(kvm, &sev->regions_list); mutex_unlock(&kvm->lock); -- 2.32.0.93.g670b81a890-goog