lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 27 Jan 2021 21:32:06 +0100
From:   Heiner Kallweit <hkallweit1@...il.com>
To:     Willem de Bruijn <willemdebruijn.kernel@...il.com>
Cc:     Jakub Kicinski <kuba@...nel.org>,
        David Miller <davem@...emloft.net>,
        Realtek linux nic maintainers <nic_swsd@...ltek.com>,
        "netdev@...r.kernel.org" <netdev@...r.kernel.org>,
        xplo.bn@...il.com
Subject: Re: [PATCH net] r8169: work around RTL8125 UDP hw bug

On 27.01.2021 20:54, Willem de Bruijn wrote:
> On Wed, Jan 27, 2021 at 2:40 PM Heiner Kallweit <hkallweit1@...il.com> wrote:
>>
>> On 27.01.2021 19:07, Willem de Bruijn wrote:
>>> On Tue, Jan 26, 2021 at 2:40 PM Heiner Kallweit <hkallweit1@...il.com> wrote:
>>>>
>>>> It was reported that on RTL8125 network breaks under heavy UDP load,
>>>> e.g. torrent traffic ([0], from comment 27). Realtek confirmed a hw bug
>>>> and provided me with a test version of the r8125 driver including a
>>>> workaround. Tests confirmed that the workaround fixes the issue.
>>>> I modified the original version of the workaround to meet mainline
>>>> code style.
>>>>
>>>> [0] https://bugzilla.kernel.org/show_bug.cgi?id=209839
>>>>
>>>> Fixes: f1bce4ad2f1c ("r8169: add support for RTL8125")
>>>> Tested-by: xplo <xplo.bn@...il.com>
>>>> Signed-off-by: Heiner Kallweit <hkallweit1@...il.com>
>>>> ---
>>>>  drivers/net/ethernet/realtek/r8169_main.c | 64 ++++++++++++++++++++---
>>>>  1 file changed, 58 insertions(+), 6 deletions(-)
>>>>
>>>> diff --git a/drivers/net/ethernet/realtek/r8169_main.c b/drivers/net/ethernet/realtek/r8169_main.c
>>>> index fb67d8f79..90052033b 100644
>>>> --- a/drivers/net/ethernet/realtek/r8169_main.c
>>>> +++ b/drivers/net/ethernet/realtek/r8169_main.c
>>>> @@ -28,6 +28,7 @@
>>>>  #include <linux/bitfield.h>
>>>>  #include <linux/prefetch.h>
>>>>  #include <linux/ipv6.h>
>>>> +#include <linux/ptp_classify.h>
>>>>  #include <asm/unaligned.h>
>>>>  #include <net/ip6_checksum.h>
>>>>
>>>> @@ -4007,17 +4008,64 @@ static int rtl8169_xmit_frags(struct rtl8169_private *tp, struct sk_buff *skb,
>>>>         return -EIO;
>>>>  }
>>>>
>>>> -static bool rtl_test_hw_pad_bug(struct rtl8169_private *tp)
>>>> +static bool rtl_skb_is_udp(struct sk_buff *skb)
>>>>  {
>>>> +       switch (vlan_get_protocol(skb)) {
>>>> +       case htons(ETH_P_IP):
>>>> +               return ip_hdr(skb)->protocol == IPPROTO_UDP;
>>>> +       case htons(ETH_P_IPV6):
>>>> +               return ipv6_hdr(skb)->nexthdr == IPPROTO_UDP;
>>>
>>> This trusts that an skb with given skb->protocol is well behaved. With
>>> packet sockets/tun/virtio, that may be false.
>>>
>>>> +       default:
>>>> +               return false;
>>>> +       }
>>>> +}
>>>> +
>>>> +#define RTL_MIN_PATCH_LEN      47
>>>> +#define PTP_GEN_PORT           320
>>>
>>> Why the two PTP ports? The report is not PTP specific. Also, what does
>>> patch mean in this context?
>>>
>>>> +
>>>> +/* see rtl8125_get_patch_pad_len() in r8125 vendor driver */
>>>> +static unsigned int rtl8125_quirk_udp_padto(struct rtl8169_private *tp,
>>>> +                                           struct sk_buff *skb)
>>>> +{
>>>> +       unsigned int padto = 0, len = skb->len;
>>>> +
>>>> +       if (rtl_is_8125(tp) && len < 175 && rtl_skb_is_udp(skb) &&
>>>> +           skb_transport_header_was_set(skb)) {
>>>
>>> What is 175 here?
>>>
>>>> +               unsigned int trans_data_len = skb_tail_pointer(skb) -
>>>> +                                             skb_transport_header(skb);
>>>> +
>>>> +               if (trans_data_len > 3 && trans_data_len < RTL_MIN_PATCH_LEN) {
>>>
>>> And 3 here, instead of sizeof(struct udphdr)
>>>
>>>> +                       u16 dest = ntohs(udp_hdr(skb)->dest);
>>>> +
>>>> +                       if (dest == PTP_EV_PORT || dest == PTP_GEN_PORT)
>>>> +                               padto = len + RTL_MIN_PATCH_LEN - trans_data_len;
>>>> +               }
>>>> +
>>>> +               if (trans_data_len < UDP_HLEN)
>>>> +                       padto = max(padto, len + UDP_HLEN - trans_data_len);
>>>> +       }
>>>> +
>>>> +       return padto;
>>>> +}
>>>> +
>>>> +static unsigned int rtl_quirk_packet_padto(struct rtl8169_private *tp,
>>>> +                                          struct sk_buff *skb)
>>>> +{
>>>> +       unsigned int padto;
>>>> +
>>>> +       padto = rtl8125_quirk_udp_padto(tp, skb);
>>>> +
>>>>         switch (tp->mac_version) {
>>>>         case RTL_GIGA_MAC_VER_34:
>>>>         case RTL_GIGA_MAC_VER_60:
>>>>         case RTL_GIGA_MAC_VER_61:
>>>>         case RTL_GIGA_MAC_VER_63:
>>>> -               return true;
>>>> +               padto = max_t(unsigned int, padto, ETH_ZLEN);
>>>>         default:
>>>> -               return false;
>>>> +               break;
>>>>         }
>>>> +
>>>> +       return padto;
>>>>  }
>>>>
>>>>  static void rtl8169_tso_csum_v1(struct sk_buff *skb, u32 *opts)
>>>> @@ -4089,9 +4137,10 @@ static bool rtl8169_tso_csum_v2(struct rtl8169_private *tp,
>>>>
>>>>                 opts[1] |= transport_offset << TCPHO_SHIFT;
>>>>         } else {
>>>> -               if (unlikely(skb->len < ETH_ZLEN && rtl_test_hw_pad_bug(tp)))
>>>> -                       /* eth_skb_pad would free the skb on error */
>>>> -                       return !__skb_put_padto(skb, ETH_ZLEN, false);
>>>> +               unsigned int padto = rtl_quirk_packet_padto(tp, skb);
>>>> +
>>>> +               /* skb_padto would free the skb on error */
>>>> +               return !__skb_put_padto(skb, padto, false);
>>>>         }
>>>>
>>>>         return true;
>>>> @@ -4268,6 +4317,9 @@ static netdev_features_t rtl8169_features_check(struct sk_buff *skb,
>>>>                 if (skb->len < ETH_ZLEN)
>>>>                         features &= ~NETIF_F_CSUM_MASK;
>>>>
>>>> +               if (rtl_quirk_packet_padto(tp, skb))
>>>> +                       features &= ~NETIF_F_CSUM_MASK;
>>>> +
>>>>                 if (transport_offset > TCPHO_MAX &&
>>>>                     rtl_chip_supports_csum_v2(tp))
>>>>                         features &= ~NETIF_F_CSUM_MASK;
>>>> --
>>>> 2.30.0
>>>>
>>
>> The workaround was provided by Realtek, I just modified it to match
>> mainline code style. For your reference I add the original version below.
>> I don't know where the magic numbers come from, Realtek releases
>> neither data sheets nor errata information.
> 
> Okay. I don't know what is customary for this process.
> 
> But I would address the possible out of bounds read by trusting ip
> header integrity in rtl_skb_is_udp.
> 
I don't know tun/virtio et al good enough to judge which header elements
may be trustworthy and which may be not. What should be checked where?

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ