Netdev List
 help / color / mirror / Atom feed
From: Jakub Kicinski <kuba@kernel.org>
To: satishkh@cisco.com
Cc: Jakub Kicinski <kuba@kernel.org>,
	andrew+netdev@lunn.ch, davem@davemloft.net, edumazet@google.com,
	pabeni@redhat.com, netdev@vger.kernel.org,
	linux-kernel@vger.kernel.org, sebaddel@cisco.com
Subject: Re: [PATCH net-next v7 08/10] enic: add MBOX VF handlers for capability, register and link state
Date: Mon, 18 May 2026 18:42:10 -0700	[thread overview]
Message-ID: <20260519014210.3395909-1-kuba@kernel.org> (raw)
In-Reply-To: <20260513-enic-sriov-v2-admin-channel-v2-v7-8-68b9f4141f4c@cisco.com>

This is an AI-generated review of your patch. The human sending this
email has considered the AI review valid, or at least plausible.
---
enic: add MBOX VF handlers for capability, register and link state

This commit implements VF-side mailbox message processing for SR-IOV V2
admin channel communication, adding receive handlers for capability, register,
unregister replies, and link state notifications, along with initiation
functions for the probe-time handshake.

> diff --git a/drivers/net/ethernet/cisco/enic/enic.h b/drivers/net/ethernet/cisco/enic/enic.h
> index 9b1fa3857df5a..483053c781df7 100644
> --- a/drivers/net/ethernet/cisco/enic/enic.h
> +++ b/drivers/net/ethernet/cisco/enic/enic.h
[ ... ]
> @@ -305,9 +307,22 @@ struct enic {
>  	void (*admin_rq_handler)(struct enic *enic, void *buf,
>  				 unsigned int len);
>  
> -	/* MBOX protocol state */
> +	/* MBOX protocol state -- single-flight: on the VF, all callers
> +	 * that wait on mbox_comp run under RTNL or during probe/remove,
> +	 * so only one completion is outstanding at a time. mbox_lock
> +	 * protects the shared admin WQ from concurrent senders.
> +	 */
>  	struct mutex mbox_lock;
>  	u64 mbox_msg_num;
> +	struct completion mbox_comp;
> +	/* Type of reply the current waiter on mbox_comp expects.  Set
> +	 * under mbox_lock before reinit_completion(); cleared after
> +	 * wait_reply returns.  Reply handlers compare against the
> +	 * incoming reply type and drop stale replies from previously
> +	 * timed-out requests instead of waking the unrelated current
> +	 * waiter.
> +	 */
> +	u8 mbox_expected_reply;

[ ... ]
> diff --git a/drivers/net/ethernet/cisco/enic/enic_mbox.c b/drivers/net/ethernet/cisco/enic/enic_mbox.c
> index 0f7f9d2d091f7..b555362379b35 100644
> --- a/drivers/net/ethernet/cisco/enic/enic_mbox.c
> +++ b/drivers/net/ethernet/cisco/enic/enic_mbox.c
[ ... ]
> +static void enic_mbox_vf_handle_link_state(struct enic *enic, void *payload)
> +{
> +	struct enic_mbox_pf_link_state_notif_msg *notif = payload;
> +	struct enic_mbox_pf_link_state_ack_msg ack = {};
> +
> +	switch (le32_to_cpu(notif->link_state)) {
[ ... ]
> +	default:
> +		netdev_warn(enic->netdev, "MBOX: unknown link state %u\n",
> +			    le32_to_cpu(notif->link_state));
> +		ack.ack.ret_major = cpu_to_le16(ENIC_MBOX_ERR_GENERIC);
> +		break;
> +	}
> +
> +	enic_mbox_send_msg(enic, ENIC_MBOX_PF_LINK_STATE_ACK, ENIC_MBOX_DST_PF,
> +			   &ack, sizeof(ack));
> +}

Could sending this ENIC_MBOX_PF_LINK_STATE_ACK with a non-zero ret_major error
code allow an unprivileged guest VM to flood the host kernel log?

Looking at the existing PF message handler enic_mbox_pf_process_msg(), when it
receives an ENIC_MBOX_PF_LINK_STATE_ACK with an error, it logs it like this:

    if (le16_to_cpu(ack->ack.ret_major))
        netdev_warn(enic->netdev,
                    "MBOX: VF %u link state ACK error %u/%u\n",
                    vf_id, le16_to_cpu(ack->ack.ret_major),
                    le16_to_cpu(ack->ack.ret_minor));

Since there is no rate limiting (like net_ratelimit()) on this specific
warning, a malicious guest could potentially craft and continuously send
invalid ACK messages to the PF's admin channel, spamming the hypervisor's log
and causing a denial of service.

[ ... ]
> +int enic_mbox_vf_capability_check(struct enic *enic)
> +{
> +	struct enic_mbox_vf_capability_msg req = {};
> +	int err;
> +
> +	enic->pf_cap_version = 0;
> +	enic->mbox_expected_reply = ENIC_MBOX_VF_CAPABILITY_REPLY;
> +	reinit_completion(&enic->mbox_comp);
> +	req.version = cpu_to_le32(ENIC_MBOX_CAP_VERSION_1);

Does this code miss acquiring mbox_lock before modifying mbox_expected_reply
and calling reinit_completion()?

The comment in enic.h dictates that mbox_expected_reply must be set under
mbox_lock before reinit_completion(), but here it seems they are updated
without holding the lock.

When a request times out, the waiter clears mbox_expected_reply = 0 without
locks. A concurrent RX handler processing a delayed reply might read the
expected type before it is cleared and proceed to call
complete(&enic->mbox_comp).

If the probe path proceeds to a cleanup step and calls
enic_mbox_vf_unregister(), could this delayed complete() race with the new
reinit_completion(), leading to a TOCTOU race where the completion is
spuriously signaled?

> +
> +	err = enic_mbox_send_msg(enic, ENIC_MBOX_VF_CAPABILITY_REQUEST,
> +				 ENIC_MBOX_DST_PF, &req, sizeof(req));
> +	if (err) {
> +		enic->mbox_expected_reply = 0;
> +		return err;
> +	}
[ ... ]
> +int enic_mbox_vf_register(struct enic *enic)
> +{
> +	int err;
> +
> +	enic->vf_registered = false;
> +	enic->mbox_expected_reply = ENIC_MBOX_VF_REGISTER_REPLY;
> +	reinit_completion(&enic->mbox_comp);

Is the same mbox_lock missing here as well?

> +
> +	err = enic_mbox_send_msg(enic, ENIC_MBOX_VF_REGISTER_REQUEST,
> +				 ENIC_MBOX_DST_PF, NULL, 0);
[ ... ]
> +int enic_mbox_vf_unregister(struct enic *enic)
> +{
> +	int err;
> +
> +	if (!enic->vf_registered)
> +		return 0;
> +
> +	enic->mbox_expected_reply = ENIC_MBOX_VF_UNREGISTER_REPLY;
> +	reinit_completion(&enic->mbox_comp);

And is it also missing here?

> +
> +	err = enic_mbox_send_msg(enic, ENIC_MBOX_VF_UNREGISTER_REQUEST,
> +				 ENIC_MBOX_DST_PF, NULL, 0);

  reply	other threads:[~2026-05-19  1:42 UTC|newest]

Thread overview: 16+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-05-13 15:15 [PATCH net-next v7 00/10] enic: SR-IOV V2 admin channel and MBOX protocol Satish Kharat
2026-05-13 15:15 ` [PATCH net-next v7 01/10] enic: verify firmware supports V2 SR-IOV at probe time Satish Kharat
2026-05-14  9:13   ` Breno Leitao
2026-05-13 15:15 ` [PATCH net-next v7 02/10] enic: add admin channel open and close for SR-IOV Satish Kharat
2026-05-13 15:15 ` [PATCH net-next v7 03/10] enic: add admin RQ buffer management Satish Kharat
2026-05-13 15:15 ` [PATCH net-next v7 04/10] enic: add admin CQ service with MSI-X interrupt and NAPI polling Satish Kharat
2026-05-19  1:36   ` Jakub Kicinski
2026-05-13 15:15 ` [PATCH net-next v7 05/10] enic: define MBOX message types and header structures Satish Kharat
2026-05-13 15:15 ` [PATCH net-next v7 06/10] enic: add MBOX core send and receive for admin channel Satish Kharat
2026-05-19  1:38   ` Jakub Kicinski
2026-05-13 15:15 ` [PATCH net-next v7 07/10] enic: add MBOX PF handlers for VF register and capability Satish Kharat
2026-05-19  1:42   ` Jakub Kicinski
2026-05-13 15:15 ` [PATCH net-next v7 08/10] enic: add MBOX VF handlers for capability, register and link state Satish Kharat
2026-05-19  1:42   ` Jakub Kicinski [this message]
2026-05-13 15:15 ` [PATCH net-next v7 09/10] enic: wire V2 SR-IOV enable with admin channel and MBOX Satish Kharat
2026-05-13 15:15 ` [PATCH net-next v7 10/10] enic: add V2 VF probe with admin channel and PF registration Satish Kharat

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20260519014210.3395909-1-kuba@kernel.org \
    --to=kuba@kernel.org \
    --cc=andrew+netdev@lunn.ch \
    --cc=davem@davemloft.net \
    --cc=edumazet@google.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=netdev@vger.kernel.org \
    --cc=pabeni@redhat.com \
    --cc=satishkh@cisco.com \
    --cc=sebaddel@cisco.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox