[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH v2] memory: prevent dma-reentracy issues
From: |
Alexander Bulekov |
Subject: |
Re: [PATCH v2] memory: prevent dma-reentracy issues |
Date: |
Tue, 21 Jun 2022 11:11:30 -0400 |
On 220621 1034, David Hildenbrand wrote:
> On 09.06.22 15:58, Alexander Bulekov wrote:
> > Add a flag to the DeviceState, when a device is engaged in PIO/MMIO/DMA.
> > This flag is set/checked prior to calling a device's MemoryRegion
> > handlers, and set when device code initiates DMA. The purpose of this
> > flag is to prevent two types of DMA-based reentrancy issues:
> >
> > 1.) mmio -> dma -> mmio case
> > 2.) bh -> dma write -> mmio case
> >
> > These issues have led to problems such as stack-exhaustion and
> > use-after-frees.
> >
> > Summary of the problem from Peter Maydell:
> > https://lore.kernel.org/qemu-devel/CAFEAcA_23vc7hE3iaM-JVA6W38LK4hJoWae5KcknhPRD5fPBZA@mail.gmail.com
> >
> > Resolves: https://gitlab.com/qemu-project/qemu/-/issues/62
> > Resolves: https://gitlab.com/qemu-project/qemu/-/issues/540
> > Resolves: https://gitlab.com/qemu-project/qemu/-/issues/541
> > Resolves: https://gitlab.com/qemu-project/qemu/-/issues/556
> > Resolves: https://gitlab.com/qemu-project/qemu/-/issues/557
> > Resolves: https://gitlab.com/qemu-project/qemu/-/issues/827
> > Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
> > ---
> > include/hw/pci/pci.h | 13 +++++++++++--
> > include/hw/qdev-core.h | 3 +++
> > softmmu/dma-helpers.c | 12 ++++++++++++
> > softmmu/memory.c | 15 +++++++++++++++
> > softmmu/trace-events | 1 +
> > 5 files changed, 42 insertions(+), 2 deletions(-)
> >
> > diff --git a/include/hw/pci/pci.h b/include/hw/pci/pci.h
> > index 44dacfa224..ab1ad0f7a8 100644
> > --- a/include/hw/pci/pci.h
> > +++ b/include/hw/pci/pci.h
> > @@ -834,8 +834,17 @@ static inline MemTxResult pci_dma_rw(PCIDevice *dev,
> > dma_addr_t addr,
> > void *buf, dma_addr_t len,
> > DMADirection dir, MemTxAttrs attrs)
> > {
> > - return dma_memory_rw(pci_get_address_space(dev), addr, buf, len,
> > - dir, attrs);
> > + bool prior_engaged_state;
> > + MemTxResult result;
> > +
> > + prior_engaged_state = dev->qdev.engaged_in_io;
> > +
> > + dev->qdev.engaged_in_io = true;
> > + result = dma_memory_rw(pci_get_address_space(dev), addr, buf, len,
> > + dir, attrs);
> > + dev->qdev.engaged_in_io = prior_engaged_state;
> > +
> > + return result;
> > }
> >
> > /**
> > diff --git a/include/hw/qdev-core.h b/include/hw/qdev-core.h
> > index 92c3d65208..6474dc51fa 100644
> > --- a/include/hw/qdev-core.h
> > +++ b/include/hw/qdev-core.h
> > @@ -193,6 +193,9 @@ struct DeviceState {
> > int instance_id_alias;
> > int alias_required_for_version;
> > ResettableState reset;
> > +
> > + /* Is the device currently in mmio/pio/dma? Used to prevent
> > re-entrancy */
> > + int engaged_in_io;
> > };
> >
> > struct DeviceListener {
> > diff --git a/softmmu/dma-helpers.c b/softmmu/dma-helpers.c
> > index 7820fec54c..7a4f1fb9b3 100644
> > --- a/softmmu/dma-helpers.c
> > +++ b/softmmu/dma-helpers.c
> > @@ -288,8 +288,16 @@ static MemTxResult dma_buf_rw(void *buf, dma_addr_t
> > len, dma_addr_t *residual,
> > uint8_t *ptr = buf;
> > dma_addr_t xresidual;
> > int sg_cur_index;
> > + DeviceState *dev;
> > + bool prior_engaged_state;
> > MemTxResult res = MEMTX_OK;
> >
> > + dev = sg->dev;
> > + if (dev) {
> > + prior_engaged_state = dev->engaged_in_io;
> > + dev->engaged_in_io = true;
> > + }
> > +
> > xresidual = sg->size;
> > sg_cur_index = 0;
> > len = MIN(len, xresidual);
> > @@ -302,6 +310,10 @@ static MemTxResult dma_buf_rw(void *buf, dma_addr_t
> > len, dma_addr_t *residual,
> > xresidual -= xfer;
> > }
> >
> > + if (dev) {
> > + dev->engaged_in_io = prior_engaged_state;
> > + }
> > +
> > if (residual) {
> > *residual = xresidual;
> > }
> > diff --git a/softmmu/memory.c b/softmmu/memory.c
> > index 7ba2048836..44a14bb4f5 100644
> > --- a/softmmu/memory.c
> > +++ b/softmmu/memory.c
> > @@ -532,6 +532,7 @@ static MemTxResult access_with_adjusted_size(hwaddr
> > addr,
> > uint64_t access_mask;
> > unsigned access_size;
> > unsigned i;
> > + DeviceState *dev = NULL;
> > MemTxResult r = MEMTX_OK;
> >
> > if (!access_size_min) {
> > @@ -541,6 +542,17 @@ static MemTxResult access_with_adjusted_size(hwaddr
> > addr,
> > access_size_max = 4;
> > }
> >
> > + /* Do not allow more than one simultanous access to a device's IO
> > Regions */
> > + if (mr->owner &&
> > + !mr->ram_device && !mr->ram && !mr->rom_device && !mr->readonly) {
>
> Would it make sense to define some helper function like
> memory_region_is_XXX (I assume XXX -> DEVICE_IO), to make that code
> easier to be consumed by humans?
Yes - There are a few other places that have similar checks. It probably
makes sense to consolidate them.
Thanks
>
> Unfortunately I cannot really comment on the sanity of the approach,
> because the underlying problem isn't completely clear to me (I think
> other people on CC were involved in the discussions around DMA reentry
> and failed attempts in the past). Having that said, that approach
> doesn't look wrong to me.
>
> --
> Thanks,
>
> David / dhildenb
>