* [PATCH net] iavf: validate num_vsis in VIRTCHNL_OP_GET_VF_RESOURCES response
@ 2026-05-13 8:51 Junrui Luo
2026-05-13 11:10 ` Przemek Kitszel
2026-05-14 6:55 ` [PATCH net v2] " Junrui Luo
0 siblings, 2 replies; 4+ messages in thread
From: Junrui Luo @ 2026-05-13 8:51 UTC (permalink / raw)
To: Tony Nguyen, Przemek Kitszel, Andrew Lunn, David S. Miller,
Eric Dumazet, Jakub Kicinski, Paolo Abeni, Mitch Williams,
Greg Rose
Cc: intel-wired-lan, netdev, linux-kernel, Yuhao Jiang, stable,
Junrui Luo
The VF allocates a fixed-size buffer for IAVF_MAX_VF_VSI (3) VSI
entries when processing a VIRTCHNL_OP_GET_VF_RESOURCES response from
the PF. However, num_vsis from the PF response is used unchecked as
the loop bound when iterating over vsi_res[] in multiple functions.
A PF sending num_vsis greater than IAVF_MAX_VF_VSI leads to
out-of-bounds accesses on the vsi_res[] array.
Clamp num_vsis to IAVF_MAX_VF_VSI in iavf_validate_num_queues(),
following the same pattern already used for num_queue_pairs.
Fixes: 5eae00c57f5e ("i40evf: main driver core")
Reported-by: Yuhao Jiang <danisjiang@gmail.com>
Cc: stable@vger.kernel.org
Signed-off-by: Junrui Luo <moonafterrain@outlook.com>
---
drivers/net/ethernet/intel/iavf/iavf_virtchnl.c | 6 ++++++
1 file changed, 6 insertions(+)
diff --git a/drivers/net/ethernet/intel/iavf/iavf_virtchnl.c b/drivers/net/ethernet/intel/iavf/iavf_virtchnl.c
index a52c100dcbc5..2ebfb65a6f3b 100644
--- a/drivers/net/ethernet/intel/iavf/iavf_virtchnl.c
+++ b/drivers/net/ethernet/intel/iavf/iavf_virtchnl.c
@@ -254,6 +254,12 @@ int iavf_send_vf_ptp_caps_msg(struct iavf_adapter *adapter)
**/
static void iavf_validate_num_queues(struct iavf_adapter *adapter)
{
+ if (adapter->vf_res->num_vsis > IAVF_MAX_VF_VSI) {
+ dev_info(&adapter->pdev->dev, "Received %d VSIs, but can only have a max of %d\n",
+ adapter->vf_res->num_vsis, IAVF_MAX_VF_VSI);
+ adapter->vf_res->num_vsis = IAVF_MAX_VF_VSI;
+ }
+
if (adapter->vf_res->num_queue_pairs > IAVF_MAX_REQ_QUEUES) {
struct virtchnl_vsi_resource *vsi_res;
int i;
---
base-commit: 7aaa8047eafd0bd628065b15757d9b48c5f9c07d
change-id: 20260513-fixes-26ec29fa50a5
Best regards,
--
Junrui Luo <moonafterrain@outlook.com>
^ permalink raw reply related [flat|nested] 4+ messages in thread* Re: [PATCH net] iavf: validate num_vsis in VIRTCHNL_OP_GET_VF_RESOURCES response 2026-05-13 8:51 [PATCH net] iavf: validate num_vsis in VIRTCHNL_OP_GET_VF_RESOURCES response Junrui Luo @ 2026-05-13 11:10 ` Przemek Kitszel 2026-05-14 6:55 ` [PATCH net v2] " Junrui Luo 1 sibling, 0 replies; 4+ messages in thread From: Przemek Kitszel @ 2026-05-13 11:10 UTC (permalink / raw) To: Junrui Luo Cc: intel-wired-lan, netdev, linux-kernel, Tony Nguyen, Andrew Lunn, David S. Miller, Eric Dumazet, Jakub Kicinski, Paolo Abeni, Yuhao Jiang, stable On 5/13/26 10:51, Junrui Luo wrote: > The VF allocates a fixed-size buffer for IAVF_MAX_VF_VSI (3) VSI this is the MAX that iavf sends to PF (and only usage of the variable) > entries when processing a VIRTCHNL_OP_GET_VF_RESOURCES response from > the PF. However, num_vsis from the PF response is used unchecked as > the loop bound when iterating over vsi_res[] in multiple functions. > > A PF sending num_vsis greater than IAVF_MAX_VF_VSI leads to > out-of-bounds accesses on the vsi_res[] array. this array is part of the same message from PF as the counter Thank you for reaching out, as is, this is not a fix if you want to add some hardening for iavf receiving side, you could add some checks that passed msg lengths cover whole messages (when accounted for FAM) > > Clamp num_vsis to IAVF_MAX_VF_VSI in iavf_validate_num_queues(), > following the same pattern already used for num_queue_pairs. > > Fixes: 5eae00c57f5e ("i40evf: main driver core") > Reported-by: Yuhao Jiang <danisjiang@gmail.com> > Cc: stable@vger.kernel.org > Signed-off-by: Junrui Luo <moonafterrain@outlook.com> > --- > drivers/net/ethernet/intel/iavf/iavf_virtchnl.c | 6 ++++++ > 1 file changed, 6 insertions(+) > > diff --git a/drivers/net/ethernet/intel/iavf/iavf_virtchnl.c b/drivers/net/ethernet/intel/iavf/iavf_virtchnl.c > index a52c100dcbc5..2ebfb65a6f3b 100644 > --- a/drivers/net/ethernet/intel/iavf/iavf_virtchnl.c > +++ b/drivers/net/ethernet/intel/iavf/iavf_virtchnl.c > @@ -254,6 +254,12 @@ int iavf_send_vf_ptp_caps_msg(struct iavf_adapter *adapter) > **/ > static void iavf_validate_num_queues(struct iavf_adapter *adapter) > { > + if (adapter->vf_res->num_vsis > IAVF_MAX_VF_VSI) { > + dev_info(&adapter->pdev->dev, "Received %d VSIs, but can only have a max of %d\n", > + adapter->vf_res->num_vsis, IAVF_MAX_VF_VSI); > + adapter->vf_res->num_vsis = IAVF_MAX_VF_VSI; > + } > + > if (adapter->vf_res->num_queue_pairs > IAVF_MAX_REQ_QUEUES) { > struct virtchnl_vsi_resource *vsi_res; > int i; > > --- > base-commit: 7aaa8047eafd0bd628065b15757d9b48c5f9c07d > change-id: 20260513-fixes-26ec29fa50a5 > > Best regards, ^ permalink raw reply [flat|nested] 4+ messages in thread
* [PATCH net v2] iavf: validate num_vsis in VIRTCHNL_OP_GET_VF_RESOURCES response 2026-05-13 8:51 [PATCH net] iavf: validate num_vsis in VIRTCHNL_OP_GET_VF_RESOURCES response Junrui Luo 2026-05-13 11:10 ` Przemek Kitszel @ 2026-05-14 6:55 ` Junrui Luo 2026-05-14 9:07 ` [Intel-wired-lan] " Loktionov, Aleksandr 1 sibling, 1 reply; 4+ messages in thread From: Junrui Luo @ 2026-05-14 6:55 UTC (permalink / raw) To: Tony Nguyen, Przemek Kitszel, Andrew Lunn, David S. Miller, Eric Dumazet, Jakub Kicinski, Paolo Abeni, Mitch Williams, Greg Rose Cc: intel-wired-lan, netdev, linux-kernel, Yuhao Jiang, stable, Junrui Luo The VF allocates a fixed-size buffer for IAVF_MAX_VF_VSI (3) VSI entries when processing a VIRTCHNL_OP_GET_VF_RESOURCES response from the PF. However, num_vsis from the PF response is used unchecked as the loop bound when iterating over vsi_res[] in multiple functions. A PF sending num_vsis greater than IAVF_MAX_VF_VSI, or the received message is shorter than num_vsis claims leads to out-of-bounds accesses on the vsi_res[] array. Clamp num_vsis based on the actual bytes copied from the PF response. Fixes: 5eae00c57f5e ("i40evf: main driver core") Reported-by: Yuhao Jiang <danisjiang@gmail.com> Cc: stable@vger.kernel.org Signed-off-by: Junrui Luo <moonafterrain@outlook.com> --- Changes in v2: - Clamp num_vsis based on actual received message length instead of IAVF_MAX_VF_VSI suggested by Przemek - Link to v1: https://lore.kernel.org/r/SYBPR01MB7881AF11C45AEDC0D4CA89C1AF062@SYBPR01MB7881.ausprd01.prod.outlook.com --- drivers/net/ethernet/intel/iavf/iavf_virtchnl.c | 26 ++++++++++++++++++++----- 1 file changed, 21 insertions(+), 5 deletions(-) diff --git a/drivers/net/ethernet/intel/iavf/iavf_virtchnl.c b/drivers/net/ethernet/intel/iavf/iavf_virtchnl.c index a52c100dcbc5..1f9a2fc70084 100644 --- a/drivers/net/ethernet/intel/iavf/iavf_virtchnl.c +++ b/drivers/net/ethernet/intel/iavf/iavf_virtchnl.c @@ -248,12 +248,28 @@ int iavf_send_vf_ptp_caps_msg(struct iavf_adapter *adapter) /** * iavf_validate_num_queues * @adapter: adapter structure + * @msglen: length of the received VF resource message * - * Validate that the number of queues the PF has sent in - * VIRTCHNL_OP_GET_VF_RESOURCES is not larger than the VF can handle. + * Validate the VIRTCHNL_OP_GET_VF_RESOURCES response from the PF. Ensure + * num_vsis does not exceed what the message length can cover, and cap + * num_queue_pairs to the VF maximum. **/ -static void iavf_validate_num_queues(struct iavf_adapter *adapter) +static void iavf_validate_num_queues(struct iavf_adapter *adapter, u16 msglen) { + u16 max_vsis; + + if (msglen < sizeof(struct virtchnl_vf_resource)) + max_vsis = 0; + else + max_vsis = (msglen - sizeof(struct virtchnl_vf_resource)) / + sizeof(struct virtchnl_vsi_resource); + + if (adapter->vf_res->num_vsis > max_vsis) { + dev_info(&adapter->pdev->dev, "Received %d VSIs, but message can only cover %d\n", + adapter->vf_res->num_vsis, max_vsis); + adapter->vf_res->num_vsis = max_vsis; + } + if (adapter->vf_res->num_queue_pairs > IAVF_MAX_REQ_QUEUES) { struct virtchnl_vsi_resource *vsi_res; int i; @@ -300,7 +316,7 @@ int iavf_get_vf_config(struct iavf_adapter *adapter) * we aren't getting too many queues */ if (!err) - iavf_validate_num_queues(adapter); + iavf_validate_num_queues(adapter, min(event.msg_len, len)); iavf_vf_parse_hw_config(hw, adapter->vf_res); kfree(event.msg_buf); @@ -2609,7 +2625,7 @@ void iavf_virtchnl_completion(struct iavf_adapter *adapter, u16 len = IAVF_VIRTCHNL_VF_RESOURCE_SIZE; memcpy(adapter->vf_res, msg, min(msglen, len)); - iavf_validate_num_queues(adapter); + iavf_validate_num_queues(adapter, min(msglen, len)); iavf_vf_parse_hw_config(&adapter->hw, adapter->vf_res); if (is_zero_ether_addr(adapter->hw.mac.addr)) { /* restore current mac address */ --- base-commit: 7aaa8047eafd0bd628065b15757d9b48c5f9c07d change-id: 20260514-fixes-a6c4176c0c6a Best regards, -- Junrui Luo <moonafterrain@outlook.com> ^ permalink raw reply related [flat|nested] 4+ messages in thread
* RE: [Intel-wired-lan] [PATCH net v2] iavf: validate num_vsis in VIRTCHNL_OP_GET_VF_RESOURCES response 2026-05-14 6:55 ` [PATCH net v2] " Junrui Luo @ 2026-05-14 9:07 ` Loktionov, Aleksandr 0 siblings, 0 replies; 4+ messages in thread From: Loktionov, Aleksandr @ 2026-05-14 9:07 UTC (permalink / raw) To: Junrui Luo, Nguyen, Anthony L, Kitszel, Przemyslaw, Andrew Lunn, David S. Miller, Eric Dumazet, Jakub Kicinski, Paolo Abeni, Mitch Williams, Greg Rose Cc: intel-wired-lan@lists.osuosl.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Yuhao Jiang, stable@vger.kernel.org > -----Original Message----- > From: Intel-wired-lan <intel-wired-lan-bounces@osuosl.org> On Behalf > Of Junrui Luo > Sent: Thursday, May 14, 2026 8:55 AM > To: Nguyen, Anthony L <anthony.l.nguyen@intel.com>; Kitszel, > Przemyslaw <przemyslaw.kitszel@intel.com>; Andrew Lunn > <andrew+netdev@lunn.ch>; David S. Miller <davem@davemloft.net>; Eric > Dumazet <edumazet@google.com>; Jakub Kicinski <kuba@kernel.org>; Paolo > Abeni <pabeni@redhat.com>; Mitch Williams > <mitch.a.williams@intel.com>; Greg Rose <gregory.v.rose@intel.com> > Cc: intel-wired-lan@lists.osuosl.org; netdev@vger.kernel.org; linux- > kernel@vger.kernel.org; Yuhao Jiang <danisjiang@gmail.com>; > stable@vger.kernel.org; Junrui Luo <moonafterrain@outlook.com> > Subject: [Intel-wired-lan] [PATCH net v2] iavf: validate num_vsis in > VIRTCHNL_OP_GET_VF_RESOURCES response > > The VF allocates a fixed-size buffer for IAVF_MAX_VF_VSI (3) VSI > entries when processing a VIRTCHNL_OP_GET_VF_RESOURCES response from > the PF. However, num_vsis from the PF response is used unchecked as > the loop bound when iterating over vsi_res[] in multiple functions. > > A PF sending num_vsis greater than IAVF_MAX_VF_VSI, or the received > message is shorter than num_vsis claims leads to out-of-bounds > accesses on the vsi_res[] array. > > Clamp num_vsis based on the actual bytes copied from the PF response. > > Fixes: 5eae00c57f5e ("i40evf: main driver core") > Reported-by: Yuhao Jiang <danisjiang@gmail.com> > Cc: stable@vger.kernel.org > Signed-off-by: Junrui Luo <moonafterrain@outlook.com> > --- > Changes in v2: > - Clamp num_vsis based on actual received message length instead of > IAVF_MAX_VF_VSI suggested by Przemek > - Link to v1: > https://lore.kernel.org/r/SYBPR01MB7881AF11C45AEDC0D4CA89C1AF062@SYBPR > 01MB7881.ausprd01.prod.outlook.com > --- > drivers/net/ethernet/intel/iavf/iavf_virtchnl.c | 26 > ++++++++++++++++++++----- > 1 file changed, 21 insertions(+), 5 deletions(-) > > diff --git a/drivers/net/ethernet/intel/iavf/iavf_virtchnl.c > b/drivers/net/ethernet/intel/iavf/iavf_virtchnl.c > index a52c100dcbc5..1f9a2fc70084 100644 > --- a/drivers/net/ethernet/intel/iavf/iavf_virtchnl.c > +++ b/drivers/net/ethernet/intel/iavf/iavf_virtchnl.c > @@ -248,12 +248,28 @@ int iavf_send_vf_ptp_caps_msg(struct > iavf_adapter *adapter) > /** > * iavf_validate_num_queues > * @adapter: adapter structure > + * @msglen: length of the received VF resource message > * > - * Validate that the number of queues the PF has sent in > - * VIRTCHNL_OP_GET_VF_RESOURCES is not larger than the VF can handle. > + * Validate the VIRTCHNL_OP_GET_VF_RESOURCES response from the PF. > + Ensure > + * num_vsis does not exceed what the message length can cover, and > cap > + * num_queue_pairs to the VF maximum. > **/ > -static void iavf_validate_num_queues(struct iavf_adapter *adapter) > +static void iavf_validate_num_queues(struct iavf_adapter *adapter, > u16 > +msglen) > { > + u16 max_vsis; > + > + if (msglen < sizeof(struct virtchnl_vf_resource)) > + max_vsis = 0; > + else > + max_vsis = (msglen - sizeof(struct > virtchnl_vf_resource)) / > + sizeof(struct virtchnl_vsi_resource); > + > + if (adapter->vf_res->num_vsis > max_vsis) { > + dev_info(&adapter->pdev->dev, "Received %d VSIs, but > message can only cover %d\n", > + adapter->vf_res->num_vsis, max_vsis); > + adapter->vf_res->num_vsis = max_vsis; > + } > + > if (adapter->vf_res->num_queue_pairs > IAVF_MAX_REQ_QUEUES) { > struct virtchnl_vsi_resource *vsi_res; > int i; > @@ -300,7 +316,7 @@ int iavf_get_vf_config(struct iavf_adapter > *adapter) > * we aren't getting too many queues > */ > if (!err) > - iavf_validate_num_queues(adapter); > + iavf_validate_num_queues(adapter, min(event.msg_len, > len)); > iavf_vf_parse_hw_config(hw, adapter->vf_res); > > kfree(event.msg_buf); > @@ -2609,7 +2625,7 @@ void iavf_virtchnl_completion(struct > iavf_adapter *adapter, > u16 len = IAVF_VIRTCHNL_VF_RESOURCE_SIZE; > > memcpy(adapter->vf_res, msg, min(msglen, len)); > - iavf_validate_num_queues(adapter); > + iavf_validate_num_queues(adapter, min(msglen, len)); > iavf_vf_parse_hw_config(&adapter->hw, adapter->vf_res); > if (is_zero_ether_addr(adapter->hw.mac.addr)) { > /* restore current mac address */ > > --- > base-commit: 7aaa8047eafd0bd628065b15757d9b48c5f9c07d > change-id: 20260514-fixes-a6c4176c0c6a > > Best regards, > -- > Junrui Luo <moonafterrain@outlook.com> Reviewed-by: Aleksandr Loktionov <aleksandr.loktionov@intel.com> ^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2026-05-14 9:07 UTC | newest] Thread overview: 4+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2026-05-13 8:51 [PATCH net] iavf: validate num_vsis in VIRTCHNL_OP_GET_VF_RESOURCES response Junrui Luo 2026-05-13 11:10 ` Przemek Kitszel 2026-05-14 6:55 ` [PATCH net v2] " Junrui Luo 2026-05-14 9:07 ` [Intel-wired-lan] " Loktionov, Aleksandr
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox