lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250827175247.83322-8-shivankg@amd.com>
Date: Wed, 27 Aug 2025 17:52:47 +0000
From: Shivank Garg <shivankg@....com>
To: <willy@...radead.org>, <akpm@...ux-foundation.org>, <david@...hat.com>,
	<pbonzini@...hat.com>, <shuah@...nel.org>, <seanjc@...gle.com>,
	<vbabka@...e.cz>
CC: <brauner@...nel.org>, <viro@...iv.linux.org.uk>, <dsterba@...e.com>,
	<xiang@...nel.org>, <chao@...nel.org>, <jaegeuk@...nel.org>, <clm@...com>,
	<josef@...icpanda.com>, <kent.overstreet@...ux.dev>, <zbestahu@...il.com>,
	<jefflexu@...ux.alibaba.com>, <dhavale@...gle.com>, <lihongbo22@...wei.com>,
	<lorenzo.stoakes@...cle.com>, <Liam.Howlett@...cle.com>, <rppt@...nel.org>,
	<surenb@...gle.com>, <mhocko@...e.com>, <ziy@...dia.com>,
	<matthew.brost@...el.com>, <joshua.hahnjy@...il.com>, <rakie.kim@...com>,
	<byungchul@...com>, <gourry@...rry.net>, <ying.huang@...ux.alibaba.com>,
	<apopple@...dia.com>, <tabba@...gle.com>, <ackerleytng@...gle.com>,
	<shivankg@....com>, <paul@...l-moore.com>, <jmorris@...ei.org>,
	<serge@...lyn.com>, <pvorel@...e.cz>, <bfoster@...hat.com>,
	<vannapurve@...gle.com>, <chao.gao@...el.com>, <bharata@....com>,
	<nikunj@....com>, <michael.day@....com>, <shdhiman@....com>,
	<yan.y.zhao@...el.com>, <Neeraj.Upadhyay@....com>, <thomas.lendacky@....com>,
	<michael.roth@....com>, <aik@....com>, <jgg@...dia.com>,
	<kalyazin@...zon.com>, <peterx@...hat.com>, <jack@...e.cz>,
	<hch@...radead.org>, <cgzones@...glemail.com>, <ira.weiny@...el.com>,
	<rientjes@...gle.com>, <roypat@...zon.co.uk>, <chao.p.peng@...el.com>,
	<amit@...radead.org>, <ddutile@...hat.com>, <dan.j.williams@...el.com>,
	<ashish.kalra@....com>, <gshan@...hat.com>, <jgowans@...zon.com>,
	<pankaj.gupta@....com>, <papaluri@....com>, <yuzhao@...gle.com>,
	<suzuki.poulose@....com>, <quic_eberman@...cinc.com>,
	<linux-bcachefs@...r.kernel.org>, <linux-btrfs@...r.kernel.org>,
	<linux-erofs@...ts.ozlabs.org>, <linux-f2fs-devel@...ts.sourceforge.net>,
	<linux-fsdevel@...r.kernel.org>, <linux-mm@...ck.org>,
	<linux-kernel@...r.kernel.org>, <linux-security-module@...r.kernel.org>,
	<kvm@...r.kernel.org>, <linux-kselftest@...r.kernel.org>,
	<linux-coco@...ts.linux.dev>
Subject: [PATCH kvm-next V11 5/7] KVM: guest_memfd: Add slab-allocated inode cache

Add dedicated inode structure (kvm_gmem_inode_info) and slab-allocated
inode cache for guest memory backing, similar to how shmem handles inodes.

This adds the necessary allocation/destruction functions and prepares
for upcoming guest_memfd NUMA policy support changes.

Signed-off-by: Shivank Garg <shivankg@....com>
---
 virt/kvm/guest_memfd.c | 70 ++++++++++++++++++++++++++++++++++++++++--
 1 file changed, 68 insertions(+), 2 deletions(-)

diff --git a/virt/kvm/guest_memfd.c b/virt/kvm/guest_memfd.c
index 6c66a0974055..356947d36a47 100644
--- a/virt/kvm/guest_memfd.c
+++ b/virt/kvm/guest_memfd.c
@@ -17,6 +17,15 @@ struct kvm_gmem {
 	struct list_head entry;
 };
 
+struct kvm_gmem_inode_info {
+	struct inode vfs_inode;
+};
+
+static inline struct kvm_gmem_inode_info *KVM_GMEM_I(struct inode *inode)
+{
+	return container_of(inode, struct kvm_gmem_inode_info, vfs_inode);
+}
+
 /**
  * folio_file_pfn - like folio_file_page, but return a pfn.
  * @folio: The folio which contains this index.
@@ -389,13 +398,46 @@ static struct file_operations kvm_gmem_fops = {
 	.fallocate	= kvm_gmem_fallocate,
 };
 
+static struct kmem_cache *kvm_gmem_inode_cachep;
+
+static struct inode *kvm_gmem_alloc_inode(struct super_block *sb)
+{
+	struct kvm_gmem_inode_info *info;
+
+	info = alloc_inode_sb(sb, kvm_gmem_inode_cachep, GFP_KERNEL);
+	if (!info)
+		return NULL;
+
+	return &info->vfs_inode;
+}
+
+static void kvm_gmem_destroy_inode(struct inode *inode)
+{
+}
+
+static void kvm_gmem_free_inode(struct inode *inode)
+{
+	kmem_cache_free(kvm_gmem_inode_cachep, KVM_GMEM_I(inode));
+}
+
+static const struct super_operations kvm_gmem_super_operations = {
+	.statfs		= simple_statfs,
+	.alloc_inode	= kvm_gmem_alloc_inode,
+	.destroy_inode	= kvm_gmem_destroy_inode,
+	.free_inode	= kvm_gmem_free_inode,
+};
+
 static int kvm_gmem_init_fs_context(struct fs_context *fc)
 {
+	struct pseudo_fs_context *ctx;
+
 	if (!init_pseudo(fc, GUEST_MEMFD_MAGIC))
 		return -ENOMEM;
 
 	fc->s_iflags |= SB_I_NOEXEC;
 	fc->s_iflags |= SB_I_NODEV;
+	ctx = fc->fs_private;
+	ctx->ops = &kvm_gmem_super_operations;
 
 	return 0;
 }
@@ -417,17 +459,41 @@ static int kvm_gmem_init_mount(void)
 	return 0;
 }
 
+static void kvm_gmem_init_inode(void *foo)
+{
+	struct kvm_gmem_inode_info *info = foo;
+
+	inode_init_once(&info->vfs_inode);
+}
+
 int kvm_gmem_init(struct module *module)
 {
-	kvm_gmem_fops.owner = module;
+	int ret;
+	struct kmem_cache_args args = {
+		.align = 0,
+		.ctor = kvm_gmem_init_inode,
+	};
 
-	return kvm_gmem_init_mount();
+	kvm_gmem_fops.owner = module;
+	kvm_gmem_inode_cachep = kmem_cache_create("kvm_gmem_inode_cache",
+						  sizeof(struct kvm_gmem_inode_info),
+						  &args, SLAB_ACCOUNT);
+	if (!kvm_gmem_inode_cachep)
+		return -ENOMEM;
+	ret = kvm_gmem_init_mount();
+	if (ret) {
+		kmem_cache_destroy(kvm_gmem_inode_cachep);
+		return ret;
+	}
+	return 0;
 }
 
 void kvm_gmem_exit(void)
 {
 	kern_unmount(kvm_gmem_mnt);
 	kvm_gmem_mnt = NULL;
+	rcu_barrier();
+	kmem_cache_destroy(kvm_gmem_inode_cachep);
 }
 
 static int kvm_gmem_migrate_folio(struct address_space *mapping,
-- 
2.43.0


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ