Received: by 10.223.176.5 with SMTP id f5csp609609wra; Fri, 9 Feb 2018 04:26:52 -0800 (PST) X-Google-Smtp-Source: AH8x2259pUxTXZd6jT+8a9SLIahdrfSA6R/1VwugE8WdU9+JqlLvt4ykOWXIpjWyWbfWmkb5/EPc X-Received: by 10.101.75.68 with SMTP id k4mr2294201pgt.335.1518179212318; Fri, 09 Feb 2018 04:26:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518179212; cv=none; d=google.com; s=arc-20160816; b=UjQ4KNXFCNxyKA3O7SmErvArNAJxj+4R36q5M0k4yUkj+dS6TJevjOs1FJ28WJ+u54 q2KPkCzam0dY6TadC1mKwl2kh3bspMKHQo5NUjvRqcqrSzABb/wLL1KgjC4DXC7VJl4L 0h+49Mycw17PbzQ+Q+dP9wqDuxUb8N/72oXG1CZwM+EEqkHjGk7uJhPN+8lLRm1rzYH6 FP7q3xEoiu0lbLlBwyU+R4JIFQ4MdFbIXF2wzN4R/TCBLTbkxp8Hv1ZquBFa4fycWEyf 7XnGjTmmLimyhdp3sI5VwPU8fJ9/B536xbVqBrrU1MWwD9uN99jXTu5MCI5hJz/Djz7k IWNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dmarc-filter:arc-authentication-results; bh=OX+tSUZJR9D4o8FBtX7ARtuDsktb/7XQxpQ+0bcK/O0=; b=VnVLXWKCOTM9BwgH/ZLnlQo2QUJwIvsalEymP/hgAnES9AZCYUqBSiSLUEqLTv0nuo GnvWsSoVK73r006nl+zfWJ394KPyWYXO3rkkwiJ79FZC9M+0jTojSWxGq1fx7yye1bSW YdRyBX0f2E93UX6RwDJa/fncFg+X9odtXnEfaNYgIaJEmx3/h1p8zznvDxuVuQAbhp7S a7kXvIH3uxS/zIKKqb6aPF4J0231I4JpVsPx6fGUcEX94ZTbe+AbMeyMV8rj3mSJDLFC 9DNEU9WkZRSUrksuKSGNjfB8Pc2qwMuXGo2hwptwZP8lE/Fj7BCxMLkHKx7EJbhmhk8U IKVw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c129si1624536pfa.362.2018.02.09.04.26.37; Fri, 09 Feb 2018 04:26:52 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751099AbeBIMZz (ORCPT + 99 others); Fri, 9 Feb 2018 07:25:55 -0500 Received: from mail.kernel.org ([198.145.29.99]:41060 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750863AbeBIMZx (ORCPT ); Fri, 9 Feb 2018 07:25:53 -0500 Received: from localhost (unknown [213.57.247.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8DCAE2172C; Fri, 9 Feb 2018 12:25:52 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 8DCAE2172C Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=leon@kernel.org Date: Fri, 9 Feb 2018 14:25:49 +0200 From: Leon Romanovsky To: "Gustavo A. R. Silva" Cc: Doug Ledford , Jason Gunthorpe , linux-rdma@vger.kernel.org, linux-kernel@vger.kernel.org, "Gustavo A. R. Silva" Subject: Re: [PATCH] RDMA/nldev: Fix multiple potential NULL pointer dereferences Message-ID: <20180209122549.GK2197@mtr-leonro.local> References: <20180209063702.GA28685@embeddedgus> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="ZmUaFz6apKcXQszQ" Content-Disposition: inline In-Reply-To: <20180209063702.GA28685@embeddedgus> User-Agent: Mutt/1.9.3 (2018-01-21) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --ZmUaFz6apKcXQszQ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Fri, Feb 09, 2018 at 12:37:02AM -0600, Gustavo A. R. Silva wrote: > In case the message header and payload cannot be stored, function > nlmsg_put returns null. > > Fix this by adding multiple sanity checks and avoid a potential > null dereference on _nlh_ when calling nlmsg_end. > > Addresses-Coverity-ID: 1454215 ("Dereference null return value") > Addresses-Coverity-ID: 1454223 ("Dereference null return value") > Addresses-Coverity-ID: 1454224 ("Dereference null return value") > Addresses-Coverity-ID: 1464669 ("Dereference null return value") > Addresses-Coverity-ID: 1464670 ("Dereference null return value") > Addresses-Coverity-ID: 1464672 ("Dereference null return value") > Fixes: e5c9469efcb1 ("RDMA/netlink: Add nldev device doit implementation") > Fixes: c3f66f7b0052 ("RDMA/netlink: Implement nldev port doit callback") > Fixes: 7d02f605f0dc ("RDMA/netlink: Add nldev port dumpit implementation") > Fixes: b5fa635aab8f ("RDMA/nldev: Provide detailed QP information") > Fixes: bf3c5a93c523 ("RDMA/nldev: Provide global resource utilization") > Signed-off-by: Gustavo A. R. Silva > --- > drivers/infiniband/core/nldev.c | 26 +++++++++++++++++++++++++- > 1 file changed, 25 insertions(+), 1 deletion(-) > It will be much better to fix the tool instead of fixing ghost case. This scenario is impossible for all those flows. We can receive the skv/msg in two ways: * First by allocating new message with NLMSG_DEFAULT_SIZE, which has more room than nlmsg_total_size(payload), payload is 0. * Second by getting from netlink.c and it will be at least "struct nlmsghdr" too. Can you please add this info to the commit message? Thanks --ZmUaFz6apKcXQszQ Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEkhr/r4Op1/04yqaB5GN7iDZyWKcFAlp9k00ACgkQ5GN7iDZy WKdHARAA0vr4FdI42q35LgsZcsrFVfY5zgTZm0x4dSJbPEJ3B9FMhdr+1GOh7DFs mn8KmIsmRMV8fgIHolE0/nOiB0devQYsw2xeOejewfld9nXd66jmFKydqmOe9NXZ LyWv2SJzjk2ce02JDArsv6/DDKOx8HQvCW658WQFfTlV0iFQ0qQV99ZHSjbNUsNe v2tanY8gDi0MMZKtkqquJaEviGxc+7kYctFlUDRIm7CYD/i9ZziWokFK+iQuobyZ MG1pROsTRGXNiBuYIbUW/8F3+rz0xTLrafemsw7FqvlpMR8ttD8u/Hbm85X5e+NL qZ0rqjAN7iRYbDChJeYpBvf/uOgE0EWBfBoKHFjxDNEfKh/dOKPRCXRyWB5H8CDE J1OTFsDBDkA5udsApEiZFwzBnR9LQ0oo0FYO6mpGj10zlhuMdB/ZMDiBsaEJy946 xCPtHEAqFqAkrQbjWsINThhTCO4VYjE8+1Hoq1las494pc3+KgCBzLKk7+ucj6nF qbf6fs5IZtOWkH8ro1cimfW2uVAYQe71ng4I3ibzrl5vo3vUwH6Z9DMiw+EhShiS Sf03Uqk2Q93vwRKZyQjFCWZdD0u5gJ5NaYVUszj2bxONe+a8H0a0EGUUnBkTKtNb PUVfmrU7JF0Iiw5h3mlwj+7IVhMT4WO8EfS1AmFBy8ph7ErxJp8= =Glsf -----END PGP SIGNATURE----- --ZmUaFz6apKcXQszQ--