Currently, DMA memory operation errors in the ftgmac100 model are not
all tested and this can lead to a guest-triggerable denial of service
as described in https://gitlab.com/qemu-project/qemu/-/work_items/3335.
To fix this, check the return value of ftgmac100_write_bd() in the TX
path and exit the TX loop on error to prevent further processing. In
the event of a DMA error, also set FTGMAC100_INT_AHB_ERR interrupt
flag as appropriate.
The FTGMAC100_INT_AHB_ERR interrupt status bit only applies to the
AST2400 SoC; on newer Aspeed SoCs, it is a reserved bit.
Nevertheless, since it is supported by the Linux driver and it should
be safe to use in the QEMU implementation across all SoCs.
Resolves: https://gitlab.com/qemu-project/qemu/-/work_items/3335
Reviewed-by: Jamin Lin <jamin_lin@aspeedtech.com>
Link: https://lore.kernel.org/qemu-devel/20260322215732.387383-3-clg@redhat.com
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
Signed-off-by: Cédric Le Goater <clg@redhat.com>
---
hw/net/ftgmac100.c | 10 ++++++++--
1 file changed, 8 insertions(+), 2 deletions(-)
diff --git a/hw/net/ftgmac100.c b/hw/net/ftgmac100.c
index d29f7dcd171b..2f05bba11d01 100644
--- a/hw/net/ftgmac100.c
+++ b/hw/net/ftgmac100.c
@@ -624,7 +624,10 @@ static void ftgmac100_do_tx(FTGMAC100State *s, uint64_t tx_ring,
bd.des0 &= ~FTGMAC100_TXDES0_TXDMA_OWN;
/* Write back the modified descriptor. */
- ftgmac100_write_bd(&bd, addr);
+ if (ftgmac100_write_bd(&bd, addr)) {
+ s->isr |= FTGMAC100_INT_AHB_ERR;
+ break;
+ }
/* Advance to the next descriptor. */
if (bd.des0 & s->txdes0_edotr) {
addr = tx_ring;
@@ -1134,7 +1137,10 @@ static ssize_t ftgmac100_receive(NetClientState *nc, const uint8_t *buf,
bd.des0 |= flags | FTGMAC100_RXDES0_LRS;
s->isr |= FTGMAC100_INT_RPKT_BUF;
}
- ftgmac100_write_bd(&bd, addr);
+ if (ftgmac100_write_bd(&bd, addr)) {
+ s->isr |= FTGMAC100_INT_AHB_ERR;
+ break;
+ }
if (bd.des0 & s->rxdes0_edorr) {
addr = s->rx_ring;
} else {
--
2.53.0
On 23.03.2026 15:55, Cédric Le Goater wrote: > Currently, DMA memory operation errors in the ftgmac100 model are not > all tested and this can lead to a guest-triggerable denial of service > as described in https://gitlab.com/qemu-project/qemu/-/work_items/3335. > > To fix this, check the return value of ftgmac100_write_bd() in the TX > path and exit the TX loop on error to prevent further processing. In > the event of a DMA error, also set FTGMAC100_INT_AHB_ERR interrupt > flag as appropriate. > > The FTGMAC100_INT_AHB_ERR interrupt status bit only applies to the > AST2400 SoC; on newer Aspeed SoCs, it is a reserved bit. > Nevertheless, since it is supported by the Linux driver and it should > be safe to use in the QEMU implementation across all SoCs. > > Resolves: https://gitlab.com/qemu-project/qemu/-/work_items/3335 > Reviewed-by: Jamin Lin <jamin_lin@aspeedtech.com> > Link: https://lore.kernel.org/qemu-devel/20260322215732.387383-3-clg@redhat.com > Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> > Signed-off-by: Cédric Le Goater <clg@redhat.com> Shouldn't this be picked up for current qemu stable series? Thanks, /mjt
Hello Michael, On 3/24/26 15:45, Michael Tokarev wrote: > On 23.03.2026 15:55, Cédric Le Goater wrote: >> Currently, DMA memory operation errors in the ftgmac100 model are not >> all tested and this can lead to a guest-triggerable denial of service >> as described in https://gitlab.com/qemu-project/qemu/-/work_items/3335. >> >> To fix this, check the return value of ftgmac100_write_bd() in the TX >> path and exit the TX loop on error to prevent further processing. In >> the event of a DMA error, also set FTGMAC100_INT_AHB_ERR interrupt >> flag as appropriate. >> >> The FTGMAC100_INT_AHB_ERR interrupt status bit only applies to the >> AST2400 SoC; on newer Aspeed SoCs, it is a reserved bit. >> Nevertheless, since it is supported by the Linux driver and it should >> be safe to use in the QEMU implementation across all SoCs. >> >> Resolves: https://gitlab.com/qemu-project/qemu/-/work_items/3335 >> Reviewed-by: Jamin Lin <jamin_lin@aspeedtech.com> >> Link: https://lore.kernel.org/qemu-devel/20260322215732.387383-3-clg@redhat.com >> Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> >> Signed-off-by: Cédric Le Goater <clg@redhat.com> > > Shouldn't this be picked up for current qemu stable series? It should be safe to do so. The overall fix for the reported issue needs : https://lore.kernel.org/qemu-devel/20260324124131.1053711-5-clg@redhat.com/T/#u Thanks, C.
© 2016 - 2026 Red Hat, Inc.