Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1054950pxb; Wed, 3 Nov 2021 17:31:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJymNJ1n4hxbeBg5nJ4FWM08MNzm8O9XF4K1jhm4pKi/1CqWkPwj5dXNRjc5x62V8RPsipKH X-Received: by 2002:a05:6602:2b90:: with SMTP id r16mr34220701iov.66.1635985886791; Wed, 03 Nov 2021 17:31:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635985886; cv=none; d=google.com; s=arc-20160816; b=0y/jCB9V0ZMweifRqiBPtHjB/CAlQnxJnTklA1nbY+4khFa+dPvuMj7Ys3ZSzp36Nh oU/hNa9hJLIPwv+UQx6GjMLyREKlr0lRFKFj32TcRiYK97wdEpeHwjr7UHcT8Ja4J2o8 okNO764D6ZVBZVcpx5Y32nCdDcuBtDRlneV5wkvkqKuKhyzCvcmzwUQcNJDhro21sIwg FGhF4RMga/u0MhS5c+yFpSPVqgVN2JVxlDlMRlyCik50EWKNmZsfrN1V3JtlNgZAANAN PuwXXKbtDGeeXNduRfhTOG3aiuH0czqdC3UMxqco0lv0osc+0SkQf7qfI+8uWwZB8DDm +r+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:reply-to:dkim-signature; bh=eDJLgTwa4Mq+pfIoYabE+ramu2f6Q5nSW9TL6LbQQsI=; b=JcuOyNOafRME82OIUn8xnB/hLUMSGvsA8hBSPPejR3K9x6bwYpnMc0LofWy/nfFIu/ 8FE4fM4jetymAQM8NzG/74NCTMYbXwodnabb6bShyEiKmhyJ90Qidw1mVnBMIZ0qvaF6 ZkWuJ1u+O8Rg7+hwr45ytNmmaF0k4cPgO2uANm2XgUGEY7wswYRfYaup35J3MaSJ41MR 3GrAH4sPpsFgGVhV1DyBbusjISzTymcLRunqlIIB7avlX7p4MihVbGHsQ4wL4x0C7q9k psC1GNMf2GKAG9vyOOYVHDvOGrzCJR+ulm7JLp1N2ZZjpvugOJhzexJplF+SVozrstXJ LBxA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=AwZyd1OG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k8si6924448iow.17.2021.11.03.17.31.14; Wed, 03 Nov 2021 17:31:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=AwZyd1OG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233709AbhKDAcB (ORCPT + 99 others); Wed, 3 Nov 2021 20:32:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52872 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233511AbhKDA3Y (ORCPT ); Wed, 3 Nov 2021 20:29:24 -0400 Received: from mail-pf1-x449.google.com (mail-pf1-x449.google.com [IPv6:2607:f8b0:4864:20::449]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B1EE9C061205 for ; Wed, 3 Nov 2021 17:26:47 -0700 (PDT) Received: by mail-pf1-x449.google.com with SMTP id s4-20020a627704000000b00481101730b1so2339854pfc.11 for ; Wed, 03 Nov 2021 17:26:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=reply-to:date:in-reply-to:message-id:mime-version:references :subject:from:to:cc; bh=eDJLgTwa4Mq+pfIoYabE+ramu2f6Q5nSW9TL6LbQQsI=; b=AwZyd1OGNd2jGC9KPlXvy0oV+JkIiHs9n78p1LAJEXYu3abpzCJ4C2qjD9WEdimC8h /U06PEKK8296gAr9y+mGJ7YU/AYB7mMLshQmjbfJT2JjYIs1QGfBkPinN0rTDsM0mJ8v y1VXf6q7OT9SnMxtkJVPvG6qnljmv27pg/hk28jYo+otmvhiKA+XTi2uKknvqQboocCi bNfT4/DvRM5KrXSU8LLRMexndgtLytkukMKS+6YJqn2ZlSHrKvNjmLuH6tB44y+OnCgy GssafhzFt1xigLvtK4LdQ29M/UL2+eLN8sYzUERpdj2aCM8q7wJx2XZ+IzRmu3TIf4VS eNLw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:reply-to:date:in-reply-to:message-id :mime-version:references:subject:from:to:cc; bh=eDJLgTwa4Mq+pfIoYabE+ramu2f6Q5nSW9TL6LbQQsI=; b=OsDWkSGTArSUbA4RtOjB9uZLrhF288I9Vj7JJbMEMaTGa+pcY/zzJVdw1bn1V2pN59 0XuKVuNWBLTxMXycK/Andk75afvjvNsArDVaZwNqW3aJt9fqo8tFFcId8y/wLhvPaU1R /Y49avK4dVy6HTlYZK/kopbzszTUaj1jEDH8cIG7TE749gZHHGxPCiGJywyNjKRYZqf9 qDveaJUpg18pQKMEp546cnod7UXAnzhiuGUdwr0L6t7hcNn2VL/QQGTM8UoVRLeZmb2o AvcL7vZaV4hDR/8qM+6JXrGQ+R25GKYZkEAhCg55BXR13GC04RgXa8AhCXTPywpK7Et6 92Pw== X-Gm-Message-State: AOAM5331J4mzkPUv9zDC1qmtGpmMbGVB+c5oSFL1Hqslbs0IGO8jQr/+ 5GPZ08rU6E2kmijN8oBEF0BT6Dx+fTI= X-Received: from seanjc.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:3e5]) (user=seanjc job=sendgmr) by 2002:a17:902:ab50:b0:13f:4c70:9322 with SMTP id ij16-20020a170902ab5000b0013f4c709322mr41332797plb.89.1635985607093; Wed, 03 Nov 2021 17:26:47 -0700 (PDT) Reply-To: Sean Christopherson Date: Thu, 4 Nov 2021 00:25:29 +0000 In-Reply-To: <20211104002531.1176691-1-seanjc@google.com> Message-Id: <20211104002531.1176691-29-seanjc@google.com> Mime-Version: 1.0 References: <20211104002531.1176691-1-seanjc@google.com> X-Mailer: git-send-email 2.33.1.1089.g2158813163f-goog Subject: [PATCH v5.5 28/30] KVM: Optimize overlapping memslots check From: Sean Christopherson To: Marc Zyngier , Huacai Chen , Aleksandar Markovic , Paul Mackerras , Anup Patel , Paul Walmsley , Palmer Dabbelt , Albert Ou , Christian Borntraeger , Janosch Frank , Paolo Bonzini Cc: James Morse , Alexandru Elisei , Suzuki K Poulose , Atish Patra , David Hildenbrand , Cornelia Huck , Claudio Imbrenda , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, linux-mips@vger.kernel.org, kvm@vger.kernel.org, kvm-ppc@vger.kernel.org, kvm-riscv@lists.infradead.org, linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, Ben Gardon , "Maciej S . Szmigiero" Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Maciej S. Szmigiero Do a quick lookup for possibly overlapping gfns when creating or moving a memslot instead of performing a linear scan of the whole memslot set. Signed-off-by: Maciej S. Szmigiero [sean: tweaked params to avoid churn in future cleanup] Signed-off-by: Sean Christopherson --- virt/kvm/kvm_main.c | 46 +++++++++++++++++++++++++++++++-------------- 1 file changed, 32 insertions(+), 14 deletions(-) diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index d095e01838bf..d22e40225703 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c @@ -1800,6 +1800,29 @@ static int kvm_set_memslot(struct kvm *kvm, return 0; } +static bool kvm_check_memslot_overlap(struct kvm_memslots *slots, int id, + gfn_t start, gfn_t end) +{ + int idx = slots->node_idx; + struct rb_node *node; + + kvm_for_each_memslot_in_gfn_range(node, slots, start, end) { + struct kvm_memory_slot *cslot; + gfn_t cend; + + cslot = container_of(node, struct kvm_memory_slot, gfn_node[idx]); + cend = cslot->base_gfn + cslot->npages; + if (cslot->id == id) + continue; + + /* kvm_for_each_in_gfn_no_more() guarantees that cslot->base_gfn < nend */ + if (cend > start) + return true; + } + + return false; +} + /* * Allocate some memory and give it an address in the guest physical address * space. @@ -1811,8 +1834,9 @@ static int kvm_set_memslot(struct kvm *kvm, int __kvm_set_memory_region(struct kvm *kvm, const struct kvm_userspace_memory_region *mem) { - struct kvm_memory_slot *old, *tmp; + struct kvm_memory_slot *old; struct kvm_memory_slot new; + struct kvm_memslots *slots; enum kvm_mr_change change; int as_id, id; int r; @@ -1841,11 +1865,13 @@ int __kvm_set_memory_region(struct kvm *kvm, if (mem->guest_phys_addr + mem->memory_size < mem->guest_phys_addr) return -EINVAL; + slots = __kvm_memslots(kvm, as_id); + /* * Note, the old memslot (and the pointer itself!) may be invalidated * and/or destroyed by kvm_set_memslot(). */ - old = id_to_memslot(__kvm_memslots(kvm, as_id), id); + old = id_to_memslot(slots, id); if (!mem->memory_size) { if (!old || !old->npages) @@ -1894,18 +1920,10 @@ int __kvm_set_memory_region(struct kvm *kvm, return 0; } - if ((change == KVM_MR_CREATE) || (change == KVM_MR_MOVE)) { - int bkt; - - /* Check for overlaps */ - kvm_for_each_memslot(tmp, bkt, __kvm_memslots(kvm, as_id)) { - if (tmp->id == id) - continue; - if (!((new.base_gfn + new.npages <= tmp->base_gfn) || - (new.base_gfn >= tmp->base_gfn + tmp->npages))) - return -EEXIST; - } - } + if ((change == KVM_MR_CREATE || change == KVM_MR_MOVE) && + kvm_check_memslot_overlap(slots, id, new.base_gfn, + new.base_gfn + new.npages)) + return -EEXIST; return kvm_set_memslot(kvm, old, &new, change); } -- 2.33.1.1089.g2158813163f-goog