All of lore.kernel.org
 help / color / mirror / Atom feed
* [Qemu-devel] [PATCH v3 0/2] intel_iommu: handle invalid ce for shadow sync
@ 2018-10-09  7:45 Peter Xu
  2018-10-09  7:45 ` [Qemu-devel] [PATCH v3 1/2] intel_iommu: move ce fetching out when sync shadow Peter Xu
                   ` (3 more replies)
  0 siblings, 4 replies; 6+ messages in thread
From: Peter Xu @ 2018-10-09  7:45 UTC (permalink / raw)
  To: qemu-devel
  Cc: Michael S . Tsirkin, Maxime Coquelin, Alex Williamson, Pei Zhang,
	Eric Auger, peterx, Jason Wang

v3:
- pick r-b
- return when -VTD_FR_CONTEXT_ENTRY_P is detected (v1 is correct here,
  but I did wrong thing when splitting the patch in v2) [Eric]

v2:
- split patch into more, remove useless comment [Eric]
- remove one error_report_once() when rework the code [Jason]

This series fixes a QEMU crash reported here:

https://bugzilla.redhat.com/show_bug.cgi?id=1627272

Please review, thanks.

Peter Xu (2):
  intel_iommu: move ce fetching out when sync shadow
  intel_iommu: handle invalid ce for shadow sync

 dtc                   |  2 +-
 hw/i386/intel_iommu.c | 55 +++++++++++++++++++++++--------------------
 2 files changed, 30 insertions(+), 27 deletions(-)

-- 
2.17.1

^ permalink raw reply	[flat|nested] 6+ messages in thread

* [Qemu-devel] [PATCH v3 1/2] intel_iommu: move ce fetching out when sync shadow
  2018-10-09  7:45 [Qemu-devel] [PATCH v3 0/2] intel_iommu: handle invalid ce for shadow sync Peter Xu
@ 2018-10-09  7:45 ` Peter Xu
  2018-10-09  7:45 ` [Qemu-devel] [PATCH v3 2/2] intel_iommu: handle invalid ce for shadow sync Peter Xu
                   ` (2 subsequent siblings)
  3 siblings, 0 replies; 6+ messages in thread
From: Peter Xu @ 2018-10-09  7:45 UTC (permalink / raw)
  To: qemu-devel
  Cc: Michael S . Tsirkin, Maxime Coquelin, Alex Williamson, Pei Zhang,
	Eric Auger, peterx, Jason Wang

There are two callers for vtd_sync_shadow_page_table_range(): one
provided a valid context entry and one not.  Move that fetching
operation into the caller vtd_sync_shadow_page_table() where we need to
fetch the context entry.

Meanwhile, remove the error_report_once() directly since we're already
tracing all the error cases in the previous call.  Instead, return error
number back to caller.  This will not change anything functional since
callers are dropping it after all.

We do this move majorly because we want to do something more later in
vtd_sync_shadow_page_table().

Reviewed-by: Eric Auger <eric.auger@redhat.com>
Signed-off-by: Peter Xu <peterx@redhat.com>
---
 dtc                   |  2 +-
 hw/i386/intel_iommu.c | 41 +++++++++++++----------------------------
 2 files changed, 14 insertions(+), 29 deletions(-)

diff --git a/dtc b/dtc
index 88f18909db..e54388015a 160000
--- a/dtc
+++ b/dtc
@@ -1 +1 @@
-Subproject commit 88f18909db731a627456f26d779445f84e449536
+Subproject commit e54388015af1fb4bf04d0bca99caba1074d9cc42
diff --git a/hw/i386/intel_iommu.c b/hw/i386/intel_iommu.c
index 3dfada19a6..d6b4f8705d 100644
--- a/hw/i386/intel_iommu.c
+++ b/hw/i386/intel_iommu.c
@@ -1035,7 +1035,6 @@ static int vtd_sync_shadow_page_hook(IOMMUTLBEntry *entry,
     return 0;
 }
 
-/* If context entry is NULL, we'll try to fetch it on our own. */
 static int vtd_sync_shadow_page_table_range(VTDAddressSpace *vtd_as,
                                             VTDContextEntry *ce,
                                             hwaddr addr, hwaddr size)
@@ -1047,39 +1046,25 @@ static int vtd_sync_shadow_page_table_range(VTDAddressSpace *vtd_as,
         .notify_unmap = true,
         .aw = s->aw_bits,
         .as = vtd_as,
+        .domain_id = VTD_CONTEXT_ENTRY_DID(ce->hi),
     };
-    VTDContextEntry ce_cache;
-    int ret;
-
-    if (ce) {
-        /* If the caller provided context entry, use it */
-        ce_cache = *ce;
-    } else {
-        /* If the caller didn't provide ce, try to fetch */
-        ret = vtd_dev_to_context_entry(s, pci_bus_num(vtd_as->bus),
-                                       vtd_as->devfn, &ce_cache);
-        if (ret) {
-            /*
-             * This should not really happen, but in case it happens,
-             * we just skip the sync for this time.  After all we even
-             * don't have the root table pointer!
-             */
-            error_report_once("%s: invalid context entry for bus 0x%x"
-                              " devfn 0x%x",
-                              __func__, pci_bus_num(vtd_as->bus),
-                              vtd_as->devfn);
-            return 0;
-        }
-    }
 
-    info.domain_id = VTD_CONTEXT_ENTRY_DID(ce_cache.hi);
-
-    return vtd_page_walk(&ce_cache, addr, addr + size, &info);
+    return vtd_page_walk(ce, addr, addr + size, &info);
 }
 
 static int vtd_sync_shadow_page_table(VTDAddressSpace *vtd_as)
 {
-    return vtd_sync_shadow_page_table_range(vtd_as, NULL, 0, UINT64_MAX);
+    int ret;
+    VTDContextEntry ce;
+
+    ret = vtd_dev_to_context_entry(vtd_as->iommu_state,
+                                   pci_bus_num(vtd_as->bus),
+                                   vtd_as->devfn, &ce);
+    if (ret) {
+        return ret;
+    }
+
+    return vtd_sync_shadow_page_table_range(vtd_as, &ce, 0, UINT64_MAX);
 }
 
 /*
-- 
2.17.1

^ permalink raw reply related	[flat|nested] 6+ messages in thread

* [Qemu-devel] [PATCH v3 2/2] intel_iommu: handle invalid ce for shadow sync
  2018-10-09  7:45 [Qemu-devel] [PATCH v3 0/2] intel_iommu: handle invalid ce for shadow sync Peter Xu
  2018-10-09  7:45 ` [Qemu-devel] [PATCH v3 1/2] intel_iommu: move ce fetching out when sync shadow Peter Xu
@ 2018-10-09  7:45 ` Peter Xu
  2018-10-09  7:55   ` Auger Eric
  2018-10-09  8:59 ` [Qemu-devel] [PATCH v3 0/2] " Maxime Coquelin
  2018-10-23 22:17 ` Peter Xu
  3 siblings, 1 reply; 6+ messages in thread
From: Peter Xu @ 2018-10-09  7:45 UTC (permalink / raw)
  To: qemu-devel
  Cc: Michael S . Tsirkin, Maxime Coquelin, Alex Williamson, Pei Zhang,
	Eric Auger, peterx, Jason Wang

We should handle VTD_FR_CONTEXT_ENTRY_P properly when synchronizing
shadow page tables.  Having invalid context entry there is perfectly
valid when we move a device out of an existing domain.  When that
happens, instead of posting an error we invalidate the whole region.

Without this patch, QEMU will crash if we do these steps:

(1) start QEMU with VT-d IOMMU and two 10G NICs (ixgbe)
(2) bind the NICs with vfio-pci in the guest
(3) start testpmd with the NICs applied
(4) stop testpmd
(5) rebind the NIC back to ixgbe kernel driver

The patch should fix it.

Reported-by: Pei Zhang <pezhang@redhat.com>
Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1627272
Signed-off-by: Peter Xu <peterx@redhat.com>
---
 hw/i386/intel_iommu.c | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)

diff --git a/hw/i386/intel_iommu.c b/hw/i386/intel_iommu.c
index d6b4f8705d..6072f9a4e0 100644
--- a/hw/i386/intel_iommu.c
+++ b/hw/i386/intel_iommu.c
@@ -37,6 +37,8 @@
 #include "kvm_i386.h"
 #include "trace.h"
 
+static void vtd_address_space_unmap(VTDAddressSpace *as, IOMMUNotifier *n);
+
 static void vtd_define_quad(IntelIOMMUState *s, hwaddr addr, uint64_t val,
                             uint64_t wmask, uint64_t w1cmask)
 {
@@ -1056,11 +1058,27 @@ static int vtd_sync_shadow_page_table(VTDAddressSpace *vtd_as)
 {
     int ret;
     VTDContextEntry ce;
+    IOMMUNotifier *n;
 
     ret = vtd_dev_to_context_entry(vtd_as->iommu_state,
                                    pci_bus_num(vtd_as->bus),
                                    vtd_as->devfn, &ce);
     if (ret) {
+        if (ret == -VTD_FR_CONTEXT_ENTRY_P) {
+            /*
+             * It's a valid scenario to have a context entry that is
+             * not present.  For example, when a device is removed
+             * from an existing domain then the context entry will be
+             * zeroed by the guest before it was put into another
+             * domain.  When this happens, instead of synchronizing
+             * the shadow pages we should invalidate all existing
+             * mappings and notify the backends.
+             */
+            IOMMU_NOTIFIER_FOREACH(n, &vtd_as->iommu) {
+                vtd_address_space_unmap(vtd_as, n);
+            }
+            ret = 0;
+        }
         return ret;
     }
 
-- 
2.17.1

^ permalink raw reply related	[flat|nested] 6+ messages in thread

* Re: [Qemu-devel] [PATCH v3 2/2] intel_iommu: handle invalid ce for shadow sync
  2018-10-09  7:45 ` [Qemu-devel] [PATCH v3 2/2] intel_iommu: handle invalid ce for shadow sync Peter Xu
@ 2018-10-09  7:55   ` Auger Eric
  0 siblings, 0 replies; 6+ messages in thread
From: Auger Eric @ 2018-10-09  7:55 UTC (permalink / raw)
  To: Peter Xu, qemu-devel
  Cc: Michael S . Tsirkin, Maxime Coquelin, Alex Williamson, Pei Zhang,
	Jason Wang

Hi Peter,

On 10/9/18 9:45 AM, Peter Xu wrote:
> We should handle VTD_FR_CONTEXT_ENTRY_P properly when synchronizing
> shadow page tables.  Having invalid context entry there is perfectly
> valid when we move a device out of an existing domain.  When that
> happens, instead of posting an error we invalidate the whole region.
> 
> Without this patch, QEMU will crash if we do these steps:
> 
> (1) start QEMU with VT-d IOMMU and two 10G NICs (ixgbe)
> (2) bind the NICs with vfio-pci in the guest
> (3) start testpmd with the NICs applied
> (4) stop testpmd
> (5) rebind the NIC back to ixgbe kernel driver
> 
> The patch should fix it.
> 
> Reported-by: Pei Zhang <pezhang@redhat.com>
> Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1627272
> Signed-off-by: Peter Xu <peterx@redhat.com>
> ---
>  hw/i386/intel_iommu.c | 18 ++++++++++++++++++
>  1 file changed, 18 insertions(+)
> 
> diff --git a/hw/i386/intel_iommu.c b/hw/i386/intel_iommu.c
> index d6b4f8705d..6072f9a4e0 100644
> --- a/hw/i386/intel_iommu.c
> +++ b/hw/i386/intel_iommu.c
> @@ -37,6 +37,8 @@
>  #include "kvm_i386.h"
>  #include "trace.h"
>  
> +static void vtd_address_space_unmap(VTDAddressSpace *as, IOMMUNotifier *n);
> +
>  static void vtd_define_quad(IntelIOMMUState *s, hwaddr addr, uint64_t val,
>                              uint64_t wmask, uint64_t w1cmask)
>  {
> @@ -1056,11 +1058,27 @@ static int vtd_sync_shadow_page_table(VTDAddressSpace *vtd_as)
>  {
>      int ret;
>      VTDContextEntry ce;
> +    IOMMUNotifier *n;
>  
>      ret = vtd_dev_to_context_entry(vtd_as->iommu_state,
>                                     pci_bus_num(vtd_as->bus),
>                                     vtd_as->devfn, &ce);
>      if (ret) {
> +        if (ret == -VTD_FR_CONTEXT_ENTRY_P) {
> +            /*
> +             * It's a valid scenario to have a context entry that is
> +             * not present.  For example, when a device is removed
> +             * from an existing domain then the context entry will be
> +             * zeroed by the guest before it was put into another
> +             * domain.  When this happens, instead of synchronizing
> +             * the shadow pages we should invalidate all existing
> +             * mappings and notify the backends.
> +             */
> +            IOMMU_NOTIFIER_FOREACH(n, &vtd_as->iommu) {
> +                vtd_address_space_unmap(vtd_as, n);
> +            }
> +            ret = 0;
> +        }
>          return ret;
>      }
>  
> 

nit: in the future, you could consider making vtd_sync_shadow_page_table
a void function as the returned value never is used.

Besides
Reviewed-by: Eric Auger <eric.auger@redhat.com>

Thanks

Eric

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [Qemu-devel] [PATCH v3 0/2] intel_iommu: handle invalid ce for shadow sync
  2018-10-09  7:45 [Qemu-devel] [PATCH v3 0/2] intel_iommu: handle invalid ce for shadow sync Peter Xu
  2018-10-09  7:45 ` [Qemu-devel] [PATCH v3 1/2] intel_iommu: move ce fetching out when sync shadow Peter Xu
  2018-10-09  7:45 ` [Qemu-devel] [PATCH v3 2/2] intel_iommu: handle invalid ce for shadow sync Peter Xu
@ 2018-10-09  8:59 ` Maxime Coquelin
  2018-10-23 22:17 ` Peter Xu
  3 siblings, 0 replies; 6+ messages in thread
From: Maxime Coquelin @ 2018-10-09  8:59 UTC (permalink / raw)
  To: Peter Xu, qemu-devel
  Cc: Michael S . Tsirkin, Alex Williamson, Pei Zhang, Eric Auger, Jason Wang



On 10/09/2018 09:45 AM, Peter Xu wrote:
> v3:
> - pick r-b
> - return when -VTD_FR_CONTEXT_ENTRY_P is detected (v1 is correct here,
>    but I did wrong thing when splitting the patch in v2) [Eric]
> 
> v2:
> - split patch into more, remove useless comment [Eric]
> - remove one error_report_once() when rework the code [Jason]
> 
> This series fixes a QEMU crash reported here:
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=1627272
> 
> Please review, thanks.
> 
> Peter Xu (2):
>    intel_iommu: move ce fetching out when sync shadow
>    intel_iommu: handle invalid ce for shadow sync
> 
>   dtc                   |  2 +-
>   hw/i386/intel_iommu.c | 55 +++++++++++++++++++++++--------------------
>   2 files changed, 30 insertions(+), 27 deletions(-)
> 

For the series:
Reviewed-by: Maxime Coquelin <maxime.coquelin@redhat.com>

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [Qemu-devel] [PATCH v3 0/2] intel_iommu: handle invalid ce for shadow sync
  2018-10-09  7:45 [Qemu-devel] [PATCH v3 0/2] intel_iommu: handle invalid ce for shadow sync Peter Xu
                   ` (2 preceding siblings ...)
  2018-10-09  8:59 ` [Qemu-devel] [PATCH v3 0/2] " Maxime Coquelin
@ 2018-10-23 22:17 ` Peter Xu
  3 siblings, 0 replies; 6+ messages in thread
From: Peter Xu @ 2018-10-23 22:17 UTC (permalink / raw)
  To: qemu-devel, Michael S. Tsirkin
  Cc: Maxime Coquelin, Alex Williamson, Pei Zhang, Eric Auger, Jason Wang

Hi, Michael,

Just a kind reminder that this series has got enough ACKs and please
consider to merge it in your next pull.  Thanks!

On Tue, Oct 09, 2018 at 03:45:41PM +0800, Peter Xu wrote:
> v3:
> - pick r-b
> - return when -VTD_FR_CONTEXT_ENTRY_P is detected (v1 is correct here,
>   but I did wrong thing when splitting the patch in v2) [Eric]
> 
> v2:
> - split patch into more, remove useless comment [Eric]
> - remove one error_report_once() when rework the code [Jason]
> 
> This series fixes a QEMU crash reported here:
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=1627272
> 
> Please review, thanks.
> 
> Peter Xu (2):
>   intel_iommu: move ce fetching out when sync shadow
>   intel_iommu: handle invalid ce for shadow sync
> 
>  dtc                   |  2 +-
>  hw/i386/intel_iommu.c | 55 +++++++++++++++++++++++--------------------
>  2 files changed, 30 insertions(+), 27 deletions(-)
> 
> -- 
> 2.17.1
> 

Regards,

-- 
Peter Xu

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2018-10-23 22:18 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-10-09  7:45 [Qemu-devel] [PATCH v3 0/2] intel_iommu: handle invalid ce for shadow sync Peter Xu
2018-10-09  7:45 ` [Qemu-devel] [PATCH v3 1/2] intel_iommu: move ce fetching out when sync shadow Peter Xu
2018-10-09  7:45 ` [Qemu-devel] [PATCH v3 2/2] intel_iommu: handle invalid ce for shadow sync Peter Xu
2018-10-09  7:55   ` Auger Eric
2018-10-09  8:59 ` [Qemu-devel] [PATCH v3 0/2] " Maxime Coquelin
2018-10-23 22:17 ` Peter Xu

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.