Currently virtio-iommu doesn't work well if there are multiple devices
in same iommu group. In below example config, guest virtio-iommu driver
can successfully probe first device but fail on others. Only one device
under the bridge can work normally.
-device virtio-iommu \
-device pcie-pci-bridge,id=root0 \
-device vfio-pci,host=81:11.0,bus=root0 \
-device vfio-pci,host=6f:01.0,bus=root0 \
The reason is virtio-iommu stores AS(address space) in hash table with
aliased BDF and corelates endpoint which is indexed by device's real
BDF, i.e., virtio_iommu_mr() is passed a real BDF to lookup AS hash
table, we either get wrong AS or NULL.
Fix it by storing AS indexed by real BDF. This way also make iova_ranges
from vfio device stored in IOMMUDevice of real BDF successfully.
Signed-off-by: Zhenzhong Duan <zhenzhong.duan@intel.com>
---
hw/virtio/virtio-iommu.c | 16 ++++++++--------
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/hw/virtio/virtio-iommu.c b/hw/virtio/virtio-iommu.c
index d99c1f0d64..6880d92a44 100644
--- a/hw/virtio/virtio-iommu.c
+++ b/hw/virtio/virtio-iommu.c
@@ -399,27 +399,27 @@ static AddressSpace *virtio_iommu_find_add_as(PCIBus *bus, void *opaque,
int real_devfn)
{
VirtIOIOMMU *s = opaque;
- IOMMUPciBus *sbus = g_hash_table_lookup(s->as_by_busptr, bus);
+ IOMMUPciBus *sbus = g_hash_table_lookup(s->as_by_busptr, real_bus);
static uint32_t mr_index;
IOMMUDevice *sdev;
if (!sbus) {
sbus = g_malloc0(sizeof(IOMMUPciBus) +
sizeof(IOMMUDevice *) * PCI_DEVFN_MAX);
- sbus->bus = bus;
- g_hash_table_insert(s->as_by_busptr, bus, sbus);
+ sbus->bus = real_bus;
+ g_hash_table_insert(s->as_by_busptr, real_bus, sbus);
}
- sdev = sbus->pbdev[devfn];
+ sdev = sbus->pbdev[real_devfn];
if (!sdev) {
char *name = g_strdup_printf("%s-%d-%d",
TYPE_VIRTIO_IOMMU_MEMORY_REGION,
- mr_index++, devfn);
- sdev = sbus->pbdev[devfn] = g_new0(IOMMUDevice, 1);
+ mr_index++, real_devfn);
+ sdev = sbus->pbdev[real_devfn] = g_new0(IOMMUDevice, 1);
sdev->viommu = s;
- sdev->bus = bus;
- sdev->devfn = devfn;
+ sdev->bus = real_bus;
+ sdev->devfn = real_devfn;
trace_virtio_iommu_init_iommu_mr(name);
--
2.34.1
Hi Zhenzhong, On 1/22/24 07:40, Zhenzhong Duan wrote: > Currently virtio-iommu doesn't work well if there are multiple devices > in same iommu group. In below example config, guest virtio-iommu driver > can successfully probe first device but fail on others. Only one device > under the bridge can work normally. > > -device virtio-iommu \ > -device pcie-pci-bridge,id=root0 \ > -device vfio-pci,host=81:11.0,bus=root0 \ > -device vfio-pci,host=6f:01.0,bus=root0 \ > > The reason is virtio-iommu stores AS(address space) in hash table with > aliased BDF and corelates endpoint which is indexed by device's real > BDF, i.e., virtio_iommu_mr() is passed a real BDF to lookup AS hash > table, we either get wrong AS or NULL. > > Fix it by storing AS indexed by real BDF. This way also make iova_ranges > from vfio device stored in IOMMUDevice of real BDF successfully. > > Signed-off-by: Zhenzhong Duan <zhenzhong.duan@intel.com> > --- > hw/virtio/virtio-iommu.c | 16 ++++++++-------- > 1 file changed, 8 insertions(+), 8 deletions(-) > > diff --git a/hw/virtio/virtio-iommu.c b/hw/virtio/virtio-iommu.c > index d99c1f0d64..6880d92a44 100644 > --- a/hw/virtio/virtio-iommu.c > +++ b/hw/virtio/virtio-iommu.c > @@ -399,27 +399,27 @@ static AddressSpace *virtio_iommu_find_add_as(PCIBus *bus, void *opaque, > int real_devfn) > { > VirtIOIOMMU *s = opaque; > - IOMMUPciBus *sbus = g_hash_table_lookup(s->as_by_busptr, bus); > + IOMMUPciBus *sbus = g_hash_table_lookup(s->as_by_busptr, real_bus); > static uint32_t mr_index; > IOMMUDevice *sdev; > > if (!sbus) { > sbus = g_malloc0(sizeof(IOMMUPciBus) + > sizeof(IOMMUDevice *) * PCI_DEVFN_MAX); > - sbus->bus = bus; > - g_hash_table_insert(s->as_by_busptr, bus, sbus); > + sbus->bus = real_bus; > + g_hash_table_insert(s->as_by_busptr, real_bus, sbus); > } > > - sdev = sbus->pbdev[devfn]; > + sdev = sbus->pbdev[real_devfn]; > if (!sdev) { > char *name = g_strdup_printf("%s-%d-%d", > TYPE_VIRTIO_IOMMU_MEMORY_REGION, > - mr_index++, devfn); > - sdev = sbus->pbdev[devfn] = g_new0(IOMMUDevice, 1); > + mr_index++, real_devfn); > + sdev = sbus->pbdev[real_devfn] = g_new0(IOMMUDevice, 1); > > sdev->viommu = s; > - sdev->bus = bus; > - sdev->devfn = devfn; > + sdev->bus = real_bus; > + sdev->devfn = real_devfn; but then this means the 2 devices would be abstracted by two different IOMMU MRs whereas in practice they cannot be distinguished from an IOMMU pov. Shouldn't the virtio-iommu driver use the same ep_id for both devices within the same group? Note there are some known issues about virtio-iommu and pcie-to-pci bridges which were reported early last year and confirmed by Robin Murphy. See: [RFC] virtio-iommu: Take into account possible aliasing in virtio_iommu_mr() <https://lore.kernel.org/all/20230116124709.793084-1-eric.auger@redhat.com/#r> https://lore.kernel.org/all/20230116124709.793084-1-eric.auger@redhat.com/ Thanks Eric > > trace_virtio_iommu_init_iommu_mr(name); >
>-----Original Message----- >From: Eric Auger <eric.auger@redhat.com> >Subject: Re: [PATCH 3/3] virtio-iommu: Support PCI device aliases > >Hi Zhenzhong, > >On 1/22/24 07:40, Zhenzhong Duan wrote: >> Currently virtio-iommu doesn't work well if there are multiple devices >> in same iommu group. In below example config, guest virtio-iommu driver >> can successfully probe first device but fail on others. Only one device >> under the bridge can work normally. >> >> -device virtio-iommu \ >> -device pcie-pci-bridge,id=root0 \ >> -device vfio-pci,host=81:11.0,bus=root0 \ >> -device vfio-pci,host=6f:01.0,bus=root0 \ >> >> The reason is virtio-iommu stores AS(address space) in hash table with >> aliased BDF and corelates endpoint which is indexed by device's real >> BDF, i.e., virtio_iommu_mr() is passed a real BDF to lookup AS hash >> table, we either get wrong AS or NULL. >> >> Fix it by storing AS indexed by real BDF. This way also make iova_ranges >> from vfio device stored in IOMMUDevice of real BDF successfully. >> >> Signed-off-by: Zhenzhong Duan <zhenzhong.duan@intel.com> >> --- >> hw/virtio/virtio-iommu.c | 16 ++++++++-------- >> 1 file changed, 8 insertions(+), 8 deletions(-) >> >> diff --git a/hw/virtio/virtio-iommu.c b/hw/virtio/virtio-iommu.c >> index d99c1f0d64..6880d92a44 100644 >> --- a/hw/virtio/virtio-iommu.c >> +++ b/hw/virtio/virtio-iommu.c >> @@ -399,27 +399,27 @@ static AddressSpace >*virtio_iommu_find_add_as(PCIBus *bus, void *opaque, >> int real_devfn) >> { >> VirtIOIOMMU *s = opaque; >> - IOMMUPciBus *sbus = g_hash_table_lookup(s->as_by_busptr, bus); >> + IOMMUPciBus *sbus = g_hash_table_lookup(s->as_by_busptr, >real_bus); >> static uint32_t mr_index; >> IOMMUDevice *sdev; >> >> if (!sbus) { >> sbus = g_malloc0(sizeof(IOMMUPciBus) + >> sizeof(IOMMUDevice *) * PCI_DEVFN_MAX); >> - sbus->bus = bus; >> - g_hash_table_insert(s->as_by_busptr, bus, sbus); >> + sbus->bus = real_bus; >> + g_hash_table_insert(s->as_by_busptr, real_bus, sbus); >> } >> >> - sdev = sbus->pbdev[devfn]; >> + sdev = sbus->pbdev[real_devfn]; >> if (!sdev) { >> char *name = g_strdup_printf("%s-%d-%d", >> TYPE_VIRTIO_IOMMU_MEMORY_REGION, >> - mr_index++, devfn); >> - sdev = sbus->pbdev[devfn] = g_new0(IOMMUDevice, 1); >> + mr_index++, real_devfn); >> + sdev = sbus->pbdev[real_devfn] = g_new0(IOMMUDevice, 1); >> >> sdev->viommu = s; >> - sdev->bus = bus; >> - sdev->devfn = devfn; >> + sdev->bus = real_bus; >> + sdev->devfn = real_devfn; >but then this means the 2 devices would be abstracted by two different >IOMMU MRs whereas in practice they cannot be distinguished from an >IOMMU pov. Yes, normally the two different IOMMU MRs should link to same guest domain, so translation result will be same. But if a malicious guest try to break, then it fails to block that. >Shouldn't the virtio-iommu driver use the same ep_id for both >devices within the same group? IIUC, you mean for domain attach and not probe request? I was thinking ep_id represented an existing device in guest, not the aliased one. > >Note there are some known issues about virtio-iommu and pcie-to-pci >bridges which were reported early last year and confirmed by Robin >Murphy. See: > >[RFC] virtio-iommu: Take into account possible aliasing in virtio_iommu_mr() ><https://lore.kernel.org/all/20230116124709.793084-1- >eric.auger@redhat.com/#r> Thanks for sharing, it’s valuable😊 BRs. Zhenzhong
© 2016 - 2024 Red Hat, Inc.