Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1836414pxb; Thu, 28 Oct 2021 10:56:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyBxvRcZdoPuzA+2a3TnGXrQ8A5DITuZdWm6Qydo2mqUUn8lk4nbCq8BG1Tzsrj84o0qOex X-Received: by 2002:a63:83c7:: with SMTP id h190mr4267636pge.232.1635443778122; Thu, 28 Oct 2021 10:56:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635443778; cv=none; d=google.com; s=arc-20160816; b=ssRpP2RHcbU4MyshhafbUgNtBAVCt9seWm2m+vJiCIUMe+fmbaZ90m37DpUiStpSKu xvOz6Aa4a5Hd2OJIRQLN4KO11qSD5kvSEhFc9tutxQgroW+I44H0283EkEVo3L4XwmFu CSn4oQu6lq0nsvIl5cVIBB8iARbcj4DMLD7s6/5P4/BxwnBq7mLR0H8wd5BDoH3TMFoQ 9Q3T+8Z0Qd4hRqeU8QHCYGCtw0E76WbRIOzviesh4EErhqQxwCSnCbTEqIDRkqbJ1L1V Wo8sWLfIfWV5+KoOQU00nstvyUff2EX2HSX/VLWOmBCw6WTbImgZc4qm05uBjF9k8Mpv 6ZNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=QUy7C3pMfYDSd+gJBLd/Qm4IQNiMMafgC3bCqMCwLnQ=; b=ZFLX0+XjalPve+XNPL3ULJ/l//DFh7HEjQ8PnVg22OmDsjBZaJoRs3rqTovbZaanMm Z5EPiS2cJ8l+MZsKZO06KQ+TW3bO7J6lNtS05Ot4Yy22EyfC4RdkByHcbYag0jr1bw56 ozMm/Xh+r0j5iACfGDuU3hef0iPBIXUG7X2VYksYoePmKS1AWUqgn4ek1RSgmdwTo6YE qYinv12XatV+CfS53jkYyjToeYc1QWym9dMq63ca+/KzkeG1gnQ0oKBUkrlNBRO0uBLK ZjY7FBC5mgqw8xFAg00XsC2fdlykiQP7n8VqhzRDQMNw6VTcsmPZ5bUORZY2wVk0lZLO HlHA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=V2m484sB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e2si8708367pjs.64.2021.10.28.10.55.31; Thu, 28 Oct 2021 10:56:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=V2m484sB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230380AbhJ1R4K (ORCPT + 99 others); Thu, 28 Oct 2021 13:56:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50620 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230361AbhJ1R4G (ORCPT ); Thu, 28 Oct 2021 13:56:06 -0400 Received: from mail-pf1-x42f.google.com (mail-pf1-x42f.google.com [IPv6:2607:f8b0:4864:20::42f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 68500C061570 for ; Thu, 28 Oct 2021 10:53:39 -0700 (PDT) Received: by mail-pf1-x42f.google.com with SMTP id x7so1697536pfh.7 for ; Thu, 28 Oct 2021 10:53:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=QUy7C3pMfYDSd+gJBLd/Qm4IQNiMMafgC3bCqMCwLnQ=; b=V2m484sBGMfAZF6ekWflWHuCH3mcIIF/yy1mokly1IVIxz5gdLick7wsTcm3QpHzsJ Fw5/ypXiO/a6ay8Hy3n8vh9aa2+wkILSk5Id7uRvN30yhTKosSzKa2UB8Q6jF941Vp+E bfvrquk+nS4d1tqzjMKYgIsD2ajVt20YYBKFPZhS66Yp4E4/r8L/XX+YMe1ikPXrmW5R dFHt6LPWU1mNxEsUMSTVsXiXkFMKpAj/YmmGLAF5asEZBY3EW1VWdaNmErr8icCFP9KP 2c+1oQeNdgcfvj+LBulpjjHnFh5S5n9G99KOPuGwDYO9n5q2/YZ34rexiNMp3GlSJ9pC 4bTQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=QUy7C3pMfYDSd+gJBLd/Qm4IQNiMMafgC3bCqMCwLnQ=; b=jMCi3xsgW3XKG035f+1nvqrkZnmQgzfLyBu2YG+X09At4pFChyoSuK5EI6S/TgroVC b98vnD8Wmt1PMRXGcsBX5MQi7hqOl82q1LIsLwl2Q7MWCp/RW1DsUY0rQE0CPJI7Y39+ Z0Xb43zcsqiHDw8HBBBXpd87kS2mtQxsbsVbYipl8r2wlH9qZzVvMTgRn5OjI0RzJrVF LGusu77dLHxDuV9ASwn8pt4yWbwof2ymM+RCVTbr8af1RJ7RMh4krHxUfU9bNm9oOWyw WzxqZjlhvPw/1cuwXqYAQLR5vzL4CQ+IXvJG8OVox/fhwKtWyl0poWgwfbIMCZ/fCrWo c+Mw== X-Gm-Message-State: AOAM533IirZcYfCAMhW0cUo2POabL7whhyTBFPJvAWof9ErtgTyp3ktv WmykKOY3tQ02gh4aNttjjSTkjg== X-Received: by 2002:aa7:8718:0:b0:47b:f2ca:2e59 with SMTP id b24-20020aa78718000000b0047bf2ca2e59mr5811730pfo.21.1635443617763; Thu, 28 Oct 2021 10:53:37 -0700 (PDT) Received: from google.com (157.214.185.35.bc.googleusercontent.com. [35.185.214.157]) by smtp.gmail.com with ESMTPSA id g18sm4539825pfj.67.2021.10.28.10.53.36 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 28 Oct 2021 10:53:37 -0700 (PDT) Date: Thu, 28 Oct 2021 17:53:33 +0000 From: Sean Christopherson To: "Maciej S. Szmigiero" Cc: Paolo Bonzini , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Igor Mammedov , Marc Zyngier , James Morse , Julien Thierry , Suzuki K Poulose , Huacai Chen , Aleksandar Markovic , Paul Mackerras , Christian Borntraeger , Janosch Frank , David Hildenbrand , Cornelia Huck , Claudio Imbrenda , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v5 13/13] KVM: Optimize overlapping memslots check Message-ID: References: <4f8718fc8da57ab799e95ef7c2060f8be0f2391f.1632171479.git.maciej.szmigiero@oracle.com> <4222ead3-f80f-0992-569f-9e1a7adbabcc@maciej.szmigiero.name> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4222ead3-f80f-0992-569f-9e1a7adbabcc@maciej.szmigiero.name> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Oct 27, 2021, Maciej S. Szmigiero wrote: > On 26.10.2021 20:59, Sean Christopherson wrote: > > > + /* kvm_for_each_in_gfn_no_more() guarantees that cslot->base_gfn < nend */ > > > + if (cend > nslot->base_gfn) > > > > Hmm, IMO the need for this check means that kvm_for_each_memslot_in_gfn_range() > > is flawed. The user of kvm_for_each...() should not be responsible for skipping > > memslots that do not actually overlap the requested range. I.e. this function > > should be no more than: > > > > static bool kvm_check_memslot_overlap(struct kvm_memslots *slots, > > struct kvm_memory_slot *slot) > > { > > gfn_t start = slot->base_gfn; > > gfn_t end = start + slot->npages; > > > > kvm_for_each_memslot_in_gfn_range(&iter, slots, start, end) { > > if (iter.slot->id != slot->id) > > return true; > > } > > > > return false; > > } > > > > > > and I suspect kvm_zap_gfn_range() could be further simplified as well. > > > > Looking back at the introduction of the helper, its comment's highlighting of > > "possibily" now makes sense. > > > > /* Iterate over each memslot *possibly* intersecting [start, end) range */ > > #define kvm_for_each_memslot_in_gfn_range(node, slots, start, end) \ > > > > That's an unnecessarily bad API. It's a very solvable problem for the iterator > > helpers to advance until there's actually overlap, not doing so violates the > > principle of least surprise, and unless I'm missing something, there's no use > > case for an "approximate" iteration. > > In principle this can be done, however this will complicate the gfn > iterator logic - especially the kvm_memslot_iter_start() part, which > will already get messier from open-coding kvm_memslots_gfn_upper_bound() > there. Hmm, no, this is trivial to handle, though admittedly a bit unpleasant. /* * Note, kvm_memslot_iter_start() finds the first memslot that _may_ overlap * the range, it does not verify that there is actual overlap. The check in * the loop body filters out the case where the highest memslot with a base_gfn * below start doesn't actually overlap. */ #define kvm_for_each_memslot_in_gfn_range(iter, node, slots, start, end) \ for (kvm_memslot_iter_start(iter, node, slots, start, end); \ kvm_memslot_iter_is_valid(iter); \ kvm_memslot_iter_next(node)) \ if (iter->slot->base_gfn + iter->slot->npages < start) { \ } else > At the same kvm_zap_gfn_range() will still need to do the memslot range > <-> request range merging by itself as it does not want to process the > whole returned memslot, but rather just the part that's actually > overlapping its requested range. That's purely coincidental though. IMO, kvm_zap_gfn_range() would be well within its rights to sanity the memslot, e.g. if (WARN_ON(memslot->base_gfn + memslot->npages < gfn_start)) continue; > In the worst case, the current code can return one memslot too much, so > I don't think it's worth bringing additional complexity just to detect > and skip it I strongly disagree. This is very much a case of one chunk of code that knows the internal details of what it's doing taking on all the pain and complexity so that users of the helper > it's not that uncommon to design an API that needs extra checking from its > caller to cover some corner cases. That doesn't mean it's desirable. > For example, see pthread_cond_wait() or kernel waitqueues with their > spurious wakeups or atomic_compare_exchange_weak() from C11. > And these are higher level APIs than a very limited internal KVM one > with just two callers. Two _existing_ callers. Odds are very, very high that future usage of kvm_for_each_memslot_in_gfn_range() will overlook the detail about the helper not actually doing what it says it does. That could be addressed to some extent by renaming it kvm_for_each_memslot_in_gfn_range_approx() or whatever, but as above this isn't difficult to handle, just gross. > In case of kvm_zap_gfn_range() the necessary checking is already > there and has to be kept due to the above range merging. > > Also, a code that is simpler is easier to understand, maintain and > so less prone to subtle bugs. Heh, and IMO that's an argument for putting all the complexity into a single location. :-)