diff mbox

net: e1000e: fix an infinite loop issue

Message ID 589996bb.02482e0a.10629.5b0e@mx.google.com
State New
Headers show

Commit Message

Li Qiang Feb. 7, 2017, 9:43 a.m. UTC
From: Li Qiang <liqiang6-s@360.cn>

This issue is the same as e1000 network card in this commit:
e1000: eliminate infinite loops on out-of-bounds transfer start.

Signed-off-by: Li Qiang <liqiang6-s@360.cn>
---
 hw/net/e1000e_core.c | 17 ++++++++++++++++-
 1 file changed, 16 insertions(+), 1 deletion(-)

Comments

Dmitry Fleytman Feb. 8, 2017, 8:38 a.m. UTC | #1
Hello,

Thanks for the patch!

The problem of infinite loop indeed exists in e1000e, however it is different from the one fixed in e1000.
Please find my comments inline.

~Dmitry

> On 7 Feb 2017, at 11:43 AM, Li Qiang <liq3ea@gmail.com> wrote:
> 
> From: Li Qiang <liqiang6-s@360.cn>
> 
> This issue is the same as e1000 network card in this commit:
> e1000: eliminate infinite loops on out-of-bounds transfer start.
> 
> Signed-off-by: Li Qiang <liqiang6-s@360.cn>
> ---
> hw/net/e1000e_core.c | 17 ++++++++++++++++-
> 1 file changed, 16 insertions(+), 1 deletion(-)
> 
> diff --git a/hw/net/e1000e_core.c b/hw/net/e1000e_core.c
> index 2b11499..53f2b1d 100644
> --- a/hw/net/e1000e_core.c
> +++ b/hw/net/e1000e_core.c
> @@ -914,7 +914,8 @@ e1000e_start_xmit(E1000ECore *core, const E1000E_TxRing *txr)
>     struct e1000_tx_desc desc;
>     bool ide = false;
>     const E1000E_RingInfo *txi = txr->i;
> -    uint32_t cause = E1000_ICS_TXQE;
> +    uint32_t tdh_start = core->mac[txi->dh], cause = E1000_ICS_TXQE;
> +
> 
>     if (!(core->mac[TCTL] & E1000_TCTL_EN)) {
>         trace_e1000e_tx_disabled();
> @@ -933,6 +934,14 @@ e1000e_start_xmit(E1000ECore *core, const E1000E_TxRing *txr)
>         cause |= e1000e_txdesc_writeback(core, base, &desc, &ide, txi->idx);
> 
>         e1000e_ring_advance(core, txi, 1);
> +
> +        /*
> +         * The following avoid infinite loop, just as the e1000
> +         */
> +        if (core->mac[txi->dh] == tdh_start ||
> +            tdh_start >= core->mac[txi->dlen] / E1000_RING_DESC_LEN) {
> +            break;
> +            }

Part of this validity check, namely
tdh_start >= core->mac[txi->dlen] / E1000_RING_DESC_LEN)
already done by e1000e_ring_advance(), therefore not needed here.

The second part - full wraparound protection is relevant, but it fixes more symptoms than the cause.
The only possible cause for full wraparound is r->dt (tail) value bigger or equal to r->dlen (length),
so I would suggest to check for this in e1000e_ring_empty() and cover both TX and RX cases at once.

>     }
> 
>     if (!ide || !e1000e_intrmgr_delay_tx_causes(core, &cause)) {
> @@ -1500,6 +1509,7 @@ e1000e_write_packet_to_guest(E1000ECore *core, struct NetRxPkt *pkt,
>     size_t desc_size;
>     size_t desc_offset = 0;
>     size_t iov_ofs = 0;
> +    uint32_t rdh_start;
> 
>     struct iovec *iov = net_rx_pkt_get_iovec(pkt);
>     size_t size = net_rx_pkt_get_total_len(pkt);
> @@ -1509,6 +1519,7 @@ e1000e_write_packet_to_guest(E1000ECore *core, struct NetRxPkt *pkt,
>     bool do_ps = e1000e_do_ps(core, pkt, &ps_hdr_len);
> 
>     rxi = rxr->i;
> +    rdh_start = core->mac[rxi->dh];
> 
>     do {
>         hwaddr ba[MAX_PS_BUFFERS];
> @@ -1605,6 +1616,10 @@ e1000e_write_packet_to_guest(E1000ECore *core, struct NetRxPkt *pkt,
>         e1000e_ring_advance(core, rxi,
>                             core->rx_desc_len / E1000_MIN_RX_DESC_LEN);
> 
> +        if (core->mac[rxi->dh] == rdh_start ||
> +            rdh_start >= core->mac[rxi->dlen] / E1000_RING_DESC_LEN) {
> +            break;
> +            }
>     } while (desc_offset < total_size);
> 
>     e1000e_update_rx_stats(core, size, total_size);
> -- 
> 1.8.3.1
>
Li Qiang Feb. 8, 2017, 9:30 a.m. UTC | #2
Hello,

2017-02-08 16:38 GMT+08:00 Dmitry Fleytman <dmitry@daynix.com>:

> Hello,
>
> Thanks for the patch!
>
> The problem of infinite loop indeed exists in e1000e, however it is
> different from the one fixed in e1000.
> Please find my comments inline.
>
>
If I read the code correctly, I think this issue is the same. Could you
please explain more? Thanks.


> ~Dmitry
>
> > On 7 Feb 2017, at 11:43 AM, Li Qiang <liq3ea@gmail.com> wrote:
> >
> > From: Li Qiang <liqiang6-s@360.cn>
> >
> > This issue is the same as e1000 network card in this commit:
> > e1000: eliminate infinite loops on out-of-bounds transfer start.
> >
> > Signed-off-by: Li Qiang <liqiang6-s@360.cn>
> > ---
> > hw/net/e1000e_core.c | 17 ++++++++++++++++-
> > 1 file changed, 16 insertions(+), 1 deletion(-)
> >
> > diff --git a/hw/net/e1000e_core.c b/hw/net/e1000e_core.c
> > index 2b11499..53f2b1d 100644
> > --- a/hw/net/e1000e_core.c
> > +++ b/hw/net/e1000e_core.c
> > @@ -914,7 +914,8 @@ e1000e_start_xmit(E1000ECore *core, const
> E1000E_TxRing *txr)
> >     struct e1000_tx_desc desc;
> >     bool ide = false;
> >     const E1000E_RingInfo *txi = txr->i;
> > -    uint32_t cause = E1000_ICS_TXQE;
> > +    uint32_t tdh_start = core->mac[txi->dh], cause = E1000_ICS_TXQE;
> > +
> >
> >     if (!(core->mac[TCTL] & E1000_TCTL_EN)) {
> >         trace_e1000e_tx_disabled();
> > @@ -933,6 +934,14 @@ e1000e_start_xmit(E1000ECore *core, const
> E1000E_TxRing *txr)
> >         cause |= e1000e_txdesc_writeback(core, base, &desc, &ide,
> txi->idx);
> >
> >         e1000e_ring_advance(core, txi, 1);
> > +
> > +        /*
> > +         * The following avoid infinite loop, just as the e1000
> > +         */
> > +        if (core->mac[txi->dh] == tdh_start ||
> > +            tdh_start >= core->mac[txi->dlen] / E1000_RING_DESC_LEN) {
> > +            break;
> > +            }
>
> Part of this validity check, namely
> tdh_start >= core->mac[txi->dlen] / E1000_RING_DESC_LEN)
> already done by e1000e_ring_advance(), therefore not needed here.
>
>
e1000e_ring_advance() check the added r->dh. Not the original one.


> The second part - full wraparound protection is relevant, but it fixes
> more symptoms than the cause.
> The only possible cause for full wraparound is r->dt (tail) value bigger
> or equal to r->dlen (length),
> so I would suggest to check for this in e1000e_ring_empty() and cover both
> TX and RX cases at once.
>
>
Do you mean 'core->mac[r->dt] >= core->mac[r->dlen]' indicate an empty ring?


> >     }
> >
> >     if (!ide || !e1000e_intrmgr_delay_tx_causes(core, &cause)) {
> > @@ -1500,6 +1509,7 @@ e1000e_write_packet_to_guest(E1000ECore *core,
> struct NetRxPkt *pkt,
> >     size_t desc_size;
> >     size_t desc_offset = 0;
> >     size_t iov_ofs = 0;
> > +    uint32_t rdh_start;
> >
> >     struct iovec *iov = net_rx_pkt_get_iovec(pkt);
> >     size_t size = net_rx_pkt_get_total_len(pkt);
> > @@ -1509,6 +1519,7 @@ e1000e_write_packet_to_guest(E1000ECore *core,
> struct NetRxPkt *pkt,
> >     bool do_ps = e1000e_do_ps(core, pkt, &ps_hdr_len);
> >
> >     rxi = rxr->i;
> > +    rdh_start = core->mac[rxi->dh];
> >
> >     do {
> >         hwaddr ba[MAX_PS_BUFFERS];
> > @@ -1605,6 +1616,10 @@ e1000e_write_packet_to_guest(E1000ECore *core,
> struct NetRxPkt *pkt,
> >         e1000e_ring_advance(core, rxi,
> >                             core->rx_desc_len / E1000_MIN_RX_DESC_LEN);
> >
> > +        if (core->mac[rxi->dh] == rdh_start ||
> > +            rdh_start >= core->mac[rxi->dlen] / E1000_RING_DESC_LEN) {
> > +            break;
> > +            }
> >     } while (desc_offset < total_size);
> >
> >     e1000e_update_rx_stats(core, size, total_size);
> > --
> > 1.8.3.1
> >
>
>
Dmitry Fleytman Feb. 8, 2017, 10:01 a.m. UTC | #3
> On 8 Feb 2017, at 11:30 AM, Li Qiang <liq3ea@gmail.com> wrote:
> 
> Hello, 
> 
> 2017-02-08 16:38 GMT+08:00 Dmitry Fleytman <dmitry@daynix.com <mailto:dmitry@daynix.com>>:
> Hello,
> 
> Thanks for the patch!
> 
> The problem of infinite loop indeed exists in e1000e, however it is different from the one fixed in e1000.
> Please find my comments inline.
> 
> 
> If I read the code correctly, I think this issue is the same. Could you please explain more? Thanks.

I meant that code changes needed to fix it are slightly different.

>  
> ~Dmitry
> 
> > On 7 Feb 2017, at 11:43 AM, Li Qiang <liq3ea@gmail.com <mailto:liq3ea@gmail.com>> wrote:
> >
> > From: Li Qiang <liqiang6-s@360.cn <mailto:liqiang6-s@360.cn>>
> >
> > This issue is the same as e1000 network card in this commit:
> > e1000: eliminate infinite loops on out-of-bounds transfer start.
> >
> > Signed-off-by: Li Qiang <liqiang6-s@360.cn <mailto:liqiang6-s@360.cn>>
> > ---
> > hw/net/e1000e_core.c | 17 ++++++++++++++++-
> > 1 file changed, 16 insertions(+), 1 deletion(-)
> >
> > diff --git a/hw/net/e1000e_core.c b/hw/net/e1000e_core.c
> > index 2b11499..53f2b1d 100644
> > --- a/hw/net/e1000e_core.c
> > +++ b/hw/net/e1000e_core.c
> > @@ -914,7 +914,8 @@ e1000e_start_xmit(E1000ECore *core, const E1000E_TxRing *txr)
> >     struct e1000_tx_desc desc;
> >     bool ide = false;
> >     const E1000E_RingInfo *txi = txr->i;
> > -    uint32_t cause = E1000_ICS_TXQE;
> > +    uint32_t tdh_start = core->mac[txi->dh], cause = E1000_ICS_TXQE;
> > +
> >
> >     if (!(core->mac[TCTL] & E1000_TCTL_EN)) {
> >         trace_e1000e_tx_disabled();
> > @@ -933,6 +934,14 @@ e1000e_start_xmit(E1000ECore *core, const E1000E_TxRing *txr)
> >         cause |= e1000e_txdesc_writeback(core, base, &desc, &ide, txi->idx);
> >
> >         e1000e_ring_advance(core, txi, 1);
> > +
> > +        /*
> > +         * The following avoid infinite loop, just as the e1000
> > +         */
> > +        if (core->mac[txi->dh] == tdh_start ||
> > +            tdh_start >= core->mac[txi->dlen] / E1000_RING_DESC_LEN) {
> > +            break;
> > +            }
> 
> Part of this validity check, namely
> tdh_start >= core->mac[txi->dlen] / E1000_RING_DESC_LEN)
> already done by e1000e_ring_advance(), therefore not needed here.
> 
> 
> e1000e_ring_advance() check the added r->dh. Not the original one.

Oh, I see now. Right, it does not make sense to check for wraparound in case original TDH was out of bounds.

Now I see there is one more problem - in case TDH is out of the ring, e1000e_ring_head_descr()
called from e1000e_start_xmit() will do out of bounds read, so TDH should be validated prior to
reading the descriptor as well.

Similar problem exists on RX also.

Besides that, as I see now, e1000e_ring_empty() is not called on RX
so validation should be done separately for TX and RX rings.

A function like e1000e_ring_validate() is needed...

>  
> The second part - full wraparound protection is relevant, but it fixes more symptoms than the cause.
> The only possible cause for full wraparound is r->dt (tail) value bigger or equal to r->dlen (length),
> so I would suggest to check for this in e1000e_ring_empty() and cover both TX and RX cases at once.
> 
> 
> Do you mean 'core->mac[r->dt] >= core->mac[r->dlen]' indicate an empty ring?
>  
> >     }
> >
> >     if (!ide || !e1000e_intrmgr_delay_tx_causes(core, &cause)) {
> > @@ -1500,6 +1509,7 @@ e1000e_write_packet_to_guest(E1000ECore *core, struct NetRxPkt *pkt,
> >     size_t desc_size;
> >     size_t desc_offset = 0;
> >     size_t iov_ofs = 0;
> > +    uint32_t rdh_start;
> >
> >     struct iovec *iov = net_rx_pkt_get_iovec(pkt);
> >     size_t size = net_rx_pkt_get_total_len(pkt);
> > @@ -1509,6 +1519,7 @@ e1000e_write_packet_to_guest(E1000ECore *core, struct NetRxPkt *pkt,
> >     bool do_ps = e1000e_do_ps(core, pkt, &ps_hdr_len);
> >
> >     rxi = rxr->i;
> > +    rdh_start = core->mac[rxi->dh];
> >
> >     do {
> >         hwaddr ba[MAX_PS_BUFFERS];
> > @@ -1605,6 +1616,10 @@ e1000e_write_packet_to_guest(E1000ECore *core, struct NetRxPkt *pkt,
> >         e1000e_ring_advance(core, rxi,
> >                             core->rx_desc_len / E1000_MIN_RX_DESC_LEN);
> >
> > +        if (core->mac[rxi->dh] == rdh_start ||
> > +            rdh_start >= core->mac[rxi->dlen] / E1000_RING_DESC_LEN) {
> > +            break;
> > +            }
> >     } while (desc_offset < total_size);
> >
> >     e1000e_update_rx_stats(core, size, total_size);
> > --
> > 1.8.3.1
> >
Li Qiang Feb. 8, 2017, 10:17 a.m. UTC | #4
Hello Dmitry,


2017-02-08 18:01 GMT+08:00 Dmitry Fleytman <dmitry@daynix.com>:

>
> On 8 Feb 2017, at 11:30 AM, Li Qiang <liq3ea@gmail.com> wrote:
>
> Hello,
>
> 2017-02-08 16:38 GMT+08:00 Dmitry Fleytman <dmitry@daynix.com>:
>
>> Hello,
>>
>> Thanks for the patch!
>>
>> The problem of infinite loop indeed exists in e1000e, however it is
>> different from the one fixed in e1000.
>> Please find my comments inline.
>>
>>
> If I read the code correctly, I think this issue is the same. Could you
> please explain more? Thanks.
>
>
> I meant that code changes needed to fix it are slightly different.
>

Got.


>
>
>
>> ~Dmitry
>>
>> > On 7 Feb 2017, at 11:43 AM, Li Qiang <liq3ea@gmail.com> wrote:
>> >
>> > From: Li Qiang <liqiang6-s@360.cn>
>> >
>> > This issue is the same as e1000 network card in this commit:
>> > e1000: eliminate infinite loops on out-of-bounds transfer start.
>> >
>> > Signed-off-by: Li Qiang <liqiang6-s@360.cn>
>> > ---
>> > hw/net/e1000e_core.c | 17 ++++++++++++++++-
>> > 1 file changed, 16 insertions(+), 1 deletion(-)
>> >
>> > diff --git a/hw/net/e1000e_core.c b/hw/net/e1000e_core.c
>> > index 2b11499..53f2b1d 100644
>> > --- a/hw/net/e1000e_core.c
>> > +++ b/hw/net/e1000e_core.c
>> > @@ -914,7 +914,8 @@ e1000e_start_xmit(E1000ECore *core, const
>> E1000E_TxRing *txr)
>> >     struct e1000_tx_desc desc;
>> >     bool ide = false;
>> >     const E1000E_RingInfo *txi = txr->i;
>> > -    uint32_t cause = E1000_ICS_TXQE;
>> > +    uint32_t tdh_start = core->mac[txi->dh], cause = E1000_ICS_TXQE;
>> > +
>> >
>> >     if (!(core->mac[TCTL] & E1000_TCTL_EN)) {
>> >         trace_e1000e_tx_disabled();
>> > @@ -933,6 +934,14 @@ e1000e_start_xmit(E1000ECore *core, const
>> E1000E_TxRing *txr)
>> >         cause |= e1000e_txdesc_writeback(core, base, &desc, &ide,
>> txi->idx);
>> >
>> >         e1000e_ring_advance(core, txi, 1);
>> > +
>> > +        /*
>> > +         * The following avoid infinite loop, just as the e1000
>> > +         */
>> > +        if (core->mac[txi->dh] == tdh_start ||
>> > +            tdh_start >= core->mac[txi->dlen] / E1000_RING_DESC_LEN) {
>> > +            break;
>> > +            }
>>
>> Part of this validity check, namely
>> tdh_start >= core->mac[txi->dlen] / E1000_RING_DESC_LEN)
>> already done by e1000e_ring_advance(), therefore not needed here.
>>
>>
> e1000e_ring_advance() check the added r->dh. Not the original one.
>
>
> Oh, I see now. Right, it does not make sense to check for wraparound in
> case original TDH was out of bounds.
>
> Now I see there is one more problem - in case TDH is out of the
> ring, e1000e_ring_head_descr()
> called from e1000e_start_xmit() will do out of bounds read, so TDH should
> be validated prior to
> reading the descriptor as well.
>
>
IIUC you mean pci_dma_read will do oob read, right? I think this is not a
issue as this is reading data from guest
And guest can provide arbitrary data. For example, just provide 10 bytes
buffer, but tell the qemu it has 1000.


> Similar problem exists on RX also.
>
> Besides that, as I see now, e1000e_ring_empty() is not called on RX
> so validation should be done separately for TX and RX rings.
>
> A function like e1000e_ring_validate() is needed...
>
>
>
>> The second part - full wraparound protection is relevant, but it fixes
>> more symptoms than the cause.
>> The only possible cause for full wraparound is r->dt (tail) value bigger
>> or equal to r->dlen (length),
>> so I would suggest to check for this in e1000e_ring_empty() and cover
>> both TX and RX cases at once.
>>
>>
> Do you mean 'core->mac[r->dt] >= core->mac[r->dlen]' indicate an empty
> ring?
>
>
>
>
So I still confused by this 'full wrapparound', any more explain?


> >     }
>> >
>> >     if (!ide || !e1000e_intrmgr_delay_tx_causes(core, &cause)) {
>> > @@ -1500,6 +1509,7 @@ e1000e_write_packet_to_guest(E1000ECore *core,
>> struct NetRxPkt *pkt,
>> >     size_t desc_size;
>> >     size_t desc_offset = 0;
>> >     size_t iov_ofs = 0;
>> > +    uint32_t rdh_start;
>> >
>> >     struct iovec *iov = net_rx_pkt_get_iovec(pkt);
>> >     size_t size = net_rx_pkt_get_total_len(pkt);
>> > @@ -1509,6 +1519,7 @@ e1000e_write_packet_to_guest(E1000ECore *core,
>> struct NetRxPkt *pkt,
>> >     bool do_ps = e1000e_do_ps(core, pkt, &ps_hdr_len);
>> >
>> >     rxi = rxr->i;
>> > +    rdh_start = core->mac[rxi->dh];
>> >
>> >     do {
>> >         hwaddr ba[MAX_PS_BUFFERS];
>> > @@ -1605,6 +1616,10 @@ e1000e_write_packet_to_guest(E1000ECore *core,
>> struct NetRxPkt *pkt,
>> >         e1000e_ring_advance(core, rxi,
>> >                             core->rx_desc_len / E1000_MIN_RX_DESC_LEN);
>> >
>> > +        if (core->mac[rxi->dh] == rdh_start ||
>> > +            rdh_start >= core->mac[rxi->dlen] / E1000_RING_DESC_LEN) {
>> > +            break;
>> > +            }
>> >     } while (desc_offset < total_size);
>> >
>> >     e1000e_update_rx_stats(core, size, total_size);
>> > --
>> > 1.8.3.1
>> >
>>
>
>
Dmitry Fleytman Feb. 8, 2017, 12:43 p.m. UTC | #5
> On 8 Feb 2017, at 12:17 PM, Li Qiang <liq3ea@gmail.com> wrote:
> 
> Hello Dmitry,
> 
> 
> 2017-02-08 18:01 GMT+08:00 Dmitry Fleytman <dmitry@daynix.com>:
> 
>> On 8 Feb 2017, at 11:30 AM, Li Qiang <liq3ea@gmail.com> wrote:
>> 
>> Hello, 
>> 
>> 2017-02-08 16:38 GMT+08:00 Dmitry Fleytman <dmitry@daynix.com>:
>> Hello,
>> 
>> Thanks for the patch!
>> 
>> The problem of infinite loop indeed exists in e1000e, however it is different from the one fixed in e1000.
>> Please find my comments inline.
>> 
>> 
>> If I read the code correctly, I think this issue is the same. Could you please explain more? Thanks.
> 
> I meant that code changes needed to fix it are slightly different.
> 
> Got.
>  
> 
>>  
>> ~Dmitry
>> 
>> > On 7 Feb 2017, at 11:43 AM, Li Qiang <liq3ea@gmail.com> wrote:
>> >
>> > From: Li Qiang <liqiang6-s@360.cn>
>> >
>> > This issue is the same as e1000 network card in this commit:
>> > e1000: eliminate infinite loops on out-of-bounds transfer start.
>> >
>> > Signed-off-by: Li Qiang <liqiang6-s@360.cn>
>> > ---
>> > hw/net/e1000e_core.c | 17 ++++++++++++++++-
>> > 1 file changed, 16 insertions(+), 1 deletion(-)
>> >
>> > diff --git a/hw/net/e1000e_core.c b/hw/net/e1000e_core.c
>> > index 2b11499..53f2b1d 100644
>> > --- a/hw/net/e1000e_core.c
>> > +++ b/hw/net/e1000e_core.c
>> > @@ -914,7 +914,8 @@ e1000e_start_xmit(E1000ECore *core, const E1000E_TxRing *txr)
>> >     struct e1000_tx_desc desc;
>> >     bool ide = false;
>> >     const E1000E_RingInfo *txi = txr->i;
>> > -    uint32_t cause = E1000_ICS_TXQE;
>> > +    uint32_t tdh_start = core->mac[txi->dh], cause = E1000_ICS_TXQE;
>> > +
>> >
>> >     if (!(core->mac[TCTL] & E1000_TCTL_EN)) {
>> >         trace_e1000e_tx_disabled();
>> > @@ -933,6 +934,14 @@ e1000e_start_xmit(E1000ECore *core, const E1000E_TxRing *txr)
>> >         cause |= e1000e_txdesc_writeback(core, base, &desc, &ide, txi->idx);
>> >
>> >         e1000e_ring_advance(core, txi, 1);
>> > +
>> > +        /*
>> > +         * The following avoid infinite loop, just as the e1000
>> > +         */
>> > +        if (core->mac[txi->dh] == tdh_start ||
>> > +            tdh_start >= core->mac[txi->dlen] / E1000_RING_DESC_LEN) {
>> > +            break;
>> > +            }
>> 
>> Part of this validity check, namely
>> tdh_start >= core->mac[txi->dlen] / E1000_RING_DESC_LEN)
>> already done by e1000e_ring_advance(), therefore not needed here.
>> 
>> 
>> e1000e_ring_advance() check the added r->dh. Not the original one.
> 
> Oh, I see now. Right, it does not make sense to check for wraparound in case original TDH was out of bounds.
> 
> Now I see there is one more problem - in case TDH is out of the ring, e1000e_ring_head_descr()
> called from e1000e_start_xmit() will do out of bounds read, so TDH should be validated prior to
> reading the descriptor as well.
> 
> 
> IIUC you mean pci_dma_read will do oob read, right? I think this is not a issue as this is reading data from guest
> And guest can provide arbitrary data. For example, just provide 10 bytes buffer, but tell the qemu it has 1000.

Agree.

>  
> Similar problem exists on RX also.
> 
> Besides that, as I see now, e1000e_ring_empty() is not called on RX
> so validation should be done separately for TX and RX rings.
> 
> A function like e1000e_ring_validate() is needed...
> 
>>  
>> The second part - full wraparound protection is relevant, but it fixes more symptoms than the cause.
>> The only possible cause for full wraparound is r->dt (tail) value bigger or equal to r->dlen (length),
>> so I would suggest to check for this in e1000e_ring_empty() and cover both TX and RX cases at once.
>> 
>> 
>> Do you mean 'core->mac[r->dt] >= core->mac[r->dlen]' indicate an empty ring?
>>  
> 
> So I still confused by this 'full wrapparound', any more explain? 

Yes, I would indicate an empty ring when r->dt in invalid. That would do the job.

Having e1000e_ring_empty() fixed, you might call it from
e1000e_write_packet_to_guest() to fix RX issues as well.

>  
>> >     }
>> >
>> >     if (!ide || !e1000e_intrmgr_delay_tx_causes(core, &cause)) {
>> > @@ -1500,6 +1509,7 @@ e1000e_write_packet_to_guest(E1000ECore *core, struct NetRxPkt *pkt,
>> >     size_t desc_size;
>> >     size_t desc_offset = 0;
>> >     size_t iov_ofs = 0;
>> > +    uint32_t rdh_start;
>> >
>> >     struct iovec *iov = net_rx_pkt_get_iovec(pkt);
>> >     size_t size = net_rx_pkt_get_total_len(pkt);
>> > @@ -1509,6 +1519,7 @@ e1000e_write_packet_to_guest(E1000ECore *core, struct NetRxPkt *pkt,
>> >     bool do_ps = e1000e_do_ps(core, pkt, &ps_hdr_len);
>> >
>> >     rxi = rxr->i;
>> > +    rdh_start = core->mac[rxi->dh];
>> >
>> >     do {
>> >         hwaddr ba[MAX_PS_BUFFERS];
>> > @@ -1605,6 +1616,10 @@ e1000e_write_packet_to_guest(E1000ECore *core, struct NetRxPkt *pkt,
>> >         e1000e_ring_advance(core, rxi,
>> >                             core->rx_desc_len / E1000_MIN_RX_DESC_LEN);
>> >
>> > +        if (core->mac[rxi->dh] == rdh_start ||
>> > +            rdh_start >= core->mac[rxi->dlen] / E1000_RING_DESC_LEN) {
>> > +            break;
>> > +            }
>> >     } while (desc_offset < total_size);
>> >
>> >     e1000e_update_rx_stats(core, size, total_size);
>> > --
>> > 1.8.3.1
>> >
diff mbox

Patch

diff --git a/hw/net/e1000e_core.c b/hw/net/e1000e_core.c
index 2b11499..53f2b1d 100644
--- a/hw/net/e1000e_core.c
+++ b/hw/net/e1000e_core.c
@@ -914,7 +914,8 @@  e1000e_start_xmit(E1000ECore *core, const E1000E_TxRing *txr)
     struct e1000_tx_desc desc;
     bool ide = false;
     const E1000E_RingInfo *txi = txr->i;
-    uint32_t cause = E1000_ICS_TXQE;
+    uint32_t tdh_start = core->mac[txi->dh], cause = E1000_ICS_TXQE;
+
 
     if (!(core->mac[TCTL] & E1000_TCTL_EN)) {
         trace_e1000e_tx_disabled();
@@ -933,6 +934,14 @@  e1000e_start_xmit(E1000ECore *core, const E1000E_TxRing *txr)
         cause |= e1000e_txdesc_writeback(core, base, &desc, &ide, txi->idx);
 
         e1000e_ring_advance(core, txi, 1);
+
+        /*
+         * The following avoid infinite loop, just as the e1000
+         */
+        if (core->mac[txi->dh] == tdh_start ||
+            tdh_start >= core->mac[txi->dlen] / E1000_RING_DESC_LEN) {
+            break;
+            }
     }
 
     if (!ide || !e1000e_intrmgr_delay_tx_causes(core, &cause)) {
@@ -1500,6 +1509,7 @@  e1000e_write_packet_to_guest(E1000ECore *core, struct NetRxPkt *pkt,
     size_t desc_size;
     size_t desc_offset = 0;
     size_t iov_ofs = 0;
+    uint32_t rdh_start;
 
     struct iovec *iov = net_rx_pkt_get_iovec(pkt);
     size_t size = net_rx_pkt_get_total_len(pkt);
@@ -1509,6 +1519,7 @@  e1000e_write_packet_to_guest(E1000ECore *core, struct NetRxPkt *pkt,
     bool do_ps = e1000e_do_ps(core, pkt, &ps_hdr_len);
 
     rxi = rxr->i;
+    rdh_start = core->mac[rxi->dh];
 
     do {
         hwaddr ba[MAX_PS_BUFFERS];
@@ -1605,6 +1616,10 @@  e1000e_write_packet_to_guest(E1000ECore *core, struct NetRxPkt *pkt,
         e1000e_ring_advance(core, rxi,
                             core->rx_desc_len / E1000_MIN_RX_DESC_LEN);
 
+        if (core->mac[rxi->dh] == rdh_start ||
+            rdh_start >= core->mac[rxi->dlen] / E1000_RING_DESC_LEN) {
+            break;
+            }
     } while (desc_offset < total_size);
 
     e1000e_update_rx_stats(core, size, total_size);