Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp369425pxb; Tue, 19 Oct 2021 04:43:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJymNqlcXIZm9HN+40K3KD7HJZIAOuuClQVLG/3FpnRuB1/aKWHxf2iCSgbqzruFJprFTO9B X-Received: by 2002:a50:bf08:: with SMTP id f8mr51088847edk.400.1634643828007; Tue, 19 Oct 2021 04:43:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634643828; cv=none; d=google.com; s=arc-20160816; b=G947fK5pWLR2x1KFWISZ3WcmFh5HZNIFJausPsJlZDqC6CFWTCmo6oP/XFyrhAQi5q DmITpL4xvcy9PfqKsGtnjUWj6h3Xj6hjDg2glaWQ11jVzR9MSkCr4ddsnoj8tKbMpmZc f7nvOqWXS9/qbBZVvr6FyzFIRVVszUKYCl2G1ttHkXDQbP4yUd1ZLxHe1y6QLuYDJXa5 QQL2TGaZtwIP7FsyFosibP+ikm0mItpDuEiNKNL0DZHz5DrhNnIupSSvqc1YNLcwtq1H JGpjUh7g7oEgmYf89OAc56AHWNkrfg3d/NKLR+yu1g6tCamPyq/ITqHGSS3JaPqDiLe7 7eIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=nX+hgZuu9fE6BhknlkkEZCMXVcIn2J/gsqHaBdOU6g0=; b=XLHZH6Wa2XMscTEeyk40VALgPkTotcSCKLx1m8dWtJPOKAnhd5ZIKBN4H1lCo7oRN1 TiVUDv94j7PsYynLGdentDcj1jKXBKv5l+SJ4EgjudHELA6YobWfo2EyQs3Yhs9qjcGS FRYKGAtmjVkQlVcxn/3MCl+WxeU3lHexgd43WEmJ1mx6mTILeTZP6bt6GxSJHOOFmzOO /rOfOfF091x0dBCkYVGzzufDbwAG75BBcQmF8PN7NVfbBTQDdqzUfdT6Ct6UcJ89QhD3 cda7y1PnSbNHAV3IafTQCx4eLNXn3ZUBIeL0HTft1FGfgRqmXdEVe32ZdsgCh62t4y6I nX+Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=KegxTO01; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z98si21373564ede.114.2021.10.19.04.43.24; Tue, 19 Oct 2021 04:43:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=KegxTO01; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235469AbhJSLlr (ORCPT + 99 others); Tue, 19 Oct 2021 07:41:47 -0400 Received: from smtp-relay-internal-1.canonical.com ([185.125.188.123]:45424 "EHLO smtp-relay-internal-1.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235415AbhJSLlj (ORCPT ); Tue, 19 Oct 2021 07:41:39 -0400 Received: from mail-pg1-f200.google.com (mail-pg1-f200.google.com [209.85.215.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id 4E8053FFF6 for ; Tue, 19 Oct 2021 11:39:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1634643566; bh=nX+hgZuu9fE6BhknlkkEZCMXVcIn2J/gsqHaBdOU6g0=; h=Subject:To:Cc:References:From:Message-ID:Date:MIME-Version: In-Reply-To:Content-Type; b=KegxTO01XyXg5ktc6Scv/x72tjEP9P1n5XL0+Q7AvS3G8wXjYAYecGUmYOscCdNs5 CjFzMXNg6NYoz+o/QcMkFXuaqYt8dwCIbYXqQK7OuE4G5vYapzNezod8zU3CbLaD0W yqDtdwTheXtuheJhuti7dOmRY99lvKIXcnuYcJeVfAYGbS+C43S7cCkDwYee8vNA5+ xGVAfarmbm62pD0HhTJDWBHxrMx8vbCDzeytq2p0n9p8EnROsM91EgnlWMIcMvzeHb 5m2hV7sqo6SfZnHwhkqwE4ixMGCCci0kqrYmXBFMmvgMircmDw0+0oaq4cRaUJWiIX u/P69PKR15Agg== Received: by mail-pg1-f200.google.com with SMTP id n22-20020a6563d6000000b0029261ffde9bso11473881pgv.22 for ; Tue, 19 Oct 2021 04:39:26 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=nX+hgZuu9fE6BhknlkkEZCMXVcIn2J/gsqHaBdOU6g0=; b=6mfNOvU3sS0sVYLibjW6AhtrdBY9v9G9bFy1P8LQmM/XNLz2TAG2KoY/PxST18xk2S rsd9b0fJA1PT/keqxWEyLLaS5IKtsEapKG0rOoV62lKWFKIyvJv3bXNfjQQt5zT8UAnB /R228FC4ILYWa348HQgVke18/6OEqOX9w1yDrD7ebmD2SSeZ+hGUzvKilOm+7IotL/v3 +5XjbP4CcAkG8z9OcYpiP8gvdq1mv4t6RiEuFTNKm+GrbHzQ2UKJRltdT69BvKuGfLz/ LBqMow+WK73FiP8L4p6Nf/cvC69494YLmRR+8j5ohpzwzlc20XaM71skXPRXHGErC7cP A65Q== X-Gm-Message-State: AOAM533OawKB5hasyMQ+EgwDZ8Vp/dl0lPR9r0BUWt9dYiEujp55aoJT C9b/lCUh61WIVpjj2M+2gC1Nf8yKhz3IerySjVusmSb+OcK6I02H2deKZBnT7RvHyLVT79V717U 0uJgTQe+0QtxHrZ6B+WwNBGLg8pd6wlw49tfnApz5XA== X-Received: by 2002:a17:902:e282:b0:13f:62b1:9a06 with SMTP id o2-20020a170902e28200b0013f62b19a06mr32926772plc.1.1634643564635; Tue, 19 Oct 2021 04:39:24 -0700 (PDT) X-Received: by 2002:a17:902:e282:b0:13f:62b1:9a06 with SMTP id o2-20020a170902e28200b0013f62b19a06mr32926746plc.1.1634643564357; Tue, 19 Oct 2021 04:39:24 -0700 (PDT) Received: from [192.168.1.124] ([69.163.84.166]) by smtp.gmail.com with ESMTPSA id y18sm15951322pff.184.2021.10.19.04.39.23 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 19 Oct 2021 04:39:23 -0700 (PDT) Subject: Re: [PATCH][linux-next] net/smc: prevent NULL dereference in smc_find_rdma_v2_device_serv() To: Karsten Graul , linux-s390@vger.kernel.org Cc: "David S. Miller" , Jakub Kicinski , netdev@vger.kernel.org, linux-kernel@vger.kernel.org References: <20211018183128.17743-1-tim.gardner@canonical.com> From: Tim Gardner Message-ID: <00975c56-da9a-2583-ac42-ae6a83e40050@canonical.com> Date: Tue, 19 Oct 2021 05:39:22 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.13.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/19/21 12:33 AM, Karsten Graul wrote: > On 18/10/2021 20:31, Tim Gardner wrote: >> Coverity complains of a possible NULL dereference in smc_find_rdma_v2_device_serv(). >> >> 1782 smc_v2_ext = smc_get_clc_v2_ext(pclc); >> CID 121151 (#1 of 1): Dereference null return value (NULL_RETURNS) >> 5. dereference: Dereferencing a pointer that might be NULL smc_v2_ext when calling smc_clc_match_eid. [show details] >> 1783 if (!smc_clc_match_eid(ini->negotiated_eid, smc_v2_ext, NULL, NULL)) >> 1784 goto not_found; >> >> Fix this by checking for NULL. > > Hmm that's a fundamental question for me: do we want to make the code checkers happy? > While I understand that those warnings give an uneasy feeling I am not sure > if the code should have additional (unneeded) checks only to avoid them. > Coverity produces a lot of false positives. I thought this one might be legitimate, but if you're comfortable that its not an issue then I'm OK with that. > In this case all NULL checks are initially done in smc_listen_v2_check(), > afterwards no more NULL checks are needed. When we would like to add them > then a lot more checks are needed, e.g. 3 times in smc_find_ism_v2_device_serv() > (not sure why coverity does not complain about them, too). > > Thoughts? > Coverity probably has produced a report from the other call sites if you've used a similar pattern, I just hadn't gotten to them yet. I'll just mark them all as false positives. rtg -- ----------- Tim Gardner Canonical, Inc