>-----Original Message----- >From: Eric Auger <eric.au...@redhat.com> >Subject: Re: [PATCH 3/3] virtio-iommu: Support PCI device aliases > >Hi Zhenzhong, > >On 1/22/24 07:40, Zhenzhong Duan wrote: >> Currently virtio-iommu doesn't work well if there are multiple devices >> in same iommu group. In below example config, guest virtio-iommu driver >> can successfully probe first device but fail on others. Only one device >> under the bridge can work normally. >> >> -device virtio-iommu \ >> -device pcie-pci-bridge,id=root0 \ >> -device vfio-pci,host=81:11.0,bus=root0 \ >> -device vfio-pci,host=6f:01.0,bus=root0 \ >> >> The reason is virtio-iommu stores AS(address space) in hash table with >> aliased BDF and corelates endpoint which is indexed by device's real >> BDF, i.e., virtio_iommu_mr() is passed a real BDF to lookup AS hash >> table, we either get wrong AS or NULL. >> >> Fix it by storing AS indexed by real BDF. This way also make iova_ranges >> from vfio device stored in IOMMUDevice of real BDF successfully. >> >> Signed-off-by: Zhenzhong Duan <zhenzhong.d...@intel.com> >> --- >> hw/virtio/virtio-iommu.c | 16 ++++++++-------- >> 1 file changed, 8 insertions(+), 8 deletions(-) >> >> diff --git a/hw/virtio/virtio-iommu.c b/hw/virtio/virtio-iommu.c >> index d99c1f0d64..6880d92a44 100644 >> --- a/hw/virtio/virtio-iommu.c >> +++ b/hw/virtio/virtio-iommu.c >> @@ -399,27 +399,27 @@ static AddressSpace >*virtio_iommu_find_add_as(PCIBus *bus, void *opaque, >> int real_devfn) >> { >> VirtIOIOMMU *s = opaque; >> - IOMMUPciBus *sbus = g_hash_table_lookup(s->as_by_busptr, bus); >> + IOMMUPciBus *sbus = g_hash_table_lookup(s->as_by_busptr, >real_bus); >> static uint32_t mr_index; >> IOMMUDevice *sdev; >> >> if (!sbus) { >> sbus = g_malloc0(sizeof(IOMMUPciBus) + >> sizeof(IOMMUDevice *) * PCI_DEVFN_MAX); >> - sbus->bus = bus; >> - g_hash_table_insert(s->as_by_busptr, bus, sbus); >> + sbus->bus = real_bus; >> + g_hash_table_insert(s->as_by_busptr, real_bus, sbus); >> } >> >> - sdev = sbus->pbdev[devfn]; >> + sdev = sbus->pbdev[real_devfn]; >> if (!sdev) { >> char *name = g_strdup_printf("%s-%d-%d", >> TYPE_VIRTIO_IOMMU_MEMORY_REGION, >> - mr_index++, devfn); >> - sdev = sbus->pbdev[devfn] = g_new0(IOMMUDevice, 1); >> + mr_index++, real_devfn); >> + sdev = sbus->pbdev[real_devfn] = g_new0(IOMMUDevice, 1); >> >> sdev->viommu = s; >> - sdev->bus = bus; >> - sdev->devfn = devfn; >> + sdev->bus = real_bus; >> + sdev->devfn = real_devfn; >but then this means the 2 devices would be abstracted by two different >IOMMU MRs whereas in practice they cannot be distinguished from an >IOMMU pov.
Yes, normally the two different IOMMU MRs should link to same guest domain, so translation result will be same. But if a malicious guest try to break, then it fails to block that. >Shouldn't the virtio-iommu driver use the same ep_id for both >devices within the same group? IIUC, you mean for domain attach and not probe request? I was thinking ep_id represented an existing device in guest, not the aliased one. > >Note there are some known issues about virtio-iommu and pcie-to-pci >bridges which were reported early last year and confirmed by Robin >Murphy. See: > >[RFC] virtio-iommu: Take into account possible aliasing in virtio_iommu_mr() ><https://lore.kernel.org/all/20230116124709.793084-1- >eric.au...@redhat.com/#r> Thanks for sharing, it’s valuable😊 BRs. Zhenzhong