diff mbox series

[for-rc] RDMA/cma: Remove open coding for overflow in cma_connect_ib

Message ID 1637599733-11096-1-git-send-email-haakon.bugge@oracle.com (mailing list archive)
State Superseded
Headers show
Series [for-rc] RDMA/cma: Remove open coding for overflow in cma_connect_ib | expand

Commit Message

Haakon Bugge Nov. 22, 2021, 4:48 p.m. UTC
The existing test is a little hard to comprehend. Use
check_add_overflow() instead.

Fixes: 04ded1672402 ("RDMA/cma: Verify private data length")
Signed-off-by: Håkon Bugge <haakon.bugge@oracle.com>
---
 drivers/infiniband/core/cma.c | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

Comments

Leon Romanovsky Nov. 23, 2021, 9:11 a.m. UTC | #1
On Mon, Nov 22, 2021 at 05:48:53PM +0100, Håkon Bugge wrote:
> The existing test is a little hard to comprehend. Use
> check_add_overflow() instead.
> 
> Fixes: 04ded1672402 ("RDMA/cma: Verify private data length")
> Signed-off-by: Håkon Bugge <haakon.bugge@oracle.com>
> ---
>  drivers/infiniband/core/cma.c | 3 +--
>  1 file changed, 1 insertion(+), 2 deletions(-)
> 
> diff --git a/drivers/infiniband/core/cma.c b/drivers/infiniband/core/cma.c
> index 835ac54..0435768 100644
> --- a/drivers/infiniband/core/cma.c
> +++ b/drivers/infiniband/core/cma.c
> @@ -4093,8 +4093,7 @@ static int cma_connect_ib(struct rdma_id_private *id_priv,
>  
>  	memset(&req, 0, sizeof req);
>  	offset = cma_user_data_offset(id_priv);
> -	req.private_data_len = offset + conn_param->private_data_len;
> -	if (req.private_data_len < conn_param->private_data_len)
> +	if (check_add_overflow(offset, conn_param->private_data_len, &req.private_data_len))
>  		return -EINVAL;

The same check exists in cma_resolve_ib_udp too.

Thanks

>  
>  	if (req.private_data_len) {
> -- 
> 1.8.3.1
>
Haakon Bugge Nov. 23, 2021, 9:50 a.m. UTC | #2
> On 23 Nov 2021, at 10:11, Leon Romanovsky <leon@kernel.org> wrote:
> 
> On Mon, Nov 22, 2021 at 05:48:53PM +0100, Håkon Bugge wrote:
>> The existing test is a little hard to comprehend. Use
>> check_add_overflow() instead.
>> 
>> Fixes: 04ded1672402 ("RDMA/cma: Verify private data length")
>> Signed-off-by: Håkon Bugge <haakon.bugge@oracle.com>
>> ---
>> drivers/infiniband/core/cma.c | 3 +--
>> 1 file changed, 1 insertion(+), 2 deletions(-)
>> 
>> diff --git a/drivers/infiniband/core/cma.c b/drivers/infiniband/core/cma.c
>> index 835ac54..0435768 100644
>> --- a/drivers/infiniband/core/cma.c
>> +++ b/drivers/infiniband/core/cma.c
>> @@ -4093,8 +4093,7 @@ static int cma_connect_ib(struct rdma_id_private *id_priv,
>> 
>> 	memset(&req, 0, sizeof req);
>> 	offset = cma_user_data_offset(id_priv);
>> -	req.private_data_len = offset + conn_param->private_data_len;
>> -	if (req.private_data_len < conn_param->private_data_len)
>> +	if (check_add_overflow(offset, conn_param->private_data_len, &req.private_data_len))
>> 		return -EINVAL;
> 
> The same check exists in cma_resolve_ib_udp too.

Thanks for pointing it out Leon. Will send a v2.


Thxs, Håkon

> 
> Thanks
> 
>> 
>> 	if (req.private_data_len) {
>> -- 
>> 1.8.3.1
Haakon Bugge Nov. 23, 2021, 10:01 a.m. UTC | #3
> On 23 Nov 2021, at 10:50, Haakon Bugge <haakon.bugge@oracle.com> wrote:
> 
> 
> 
>> On 23 Nov 2021, at 10:11, Leon Romanovsky <leon@kernel.org> wrote:
>> 
>> On Mon, Nov 22, 2021 at 05:48:53PM +0100, Håkon Bugge wrote:
>>> The existing test is a little hard to comprehend. Use
>>> check_add_overflow() instead.
>>> 
>>> Fixes: 04ded1672402 ("RDMA/cma: Verify private data length")
>>> Signed-off-by: Håkon Bugge <haakon.bugge@oracle.com>
>>> ---
>>> drivers/infiniband/core/cma.c | 3 +--
>>> 1 file changed, 1 insertion(+), 2 deletions(-)
>>> 
>>> diff --git a/drivers/infiniband/core/cma.c b/drivers/infiniband/core/cma.c
>>> index 835ac54..0435768 100644
>>> --- a/drivers/infiniband/core/cma.c
>>> +++ b/drivers/infiniband/core/cma.c
>>> @@ -4093,8 +4093,7 @@ static int cma_connect_ib(struct rdma_id_private *id_priv,
>>> 
>>> 	memset(&req, 0, sizeof req);
>>> 	offset = cma_user_data_offset(id_priv);
>>> -	req.private_data_len = offset + conn_param->private_data_len;
>>> -	if (req.private_data_len < conn_param->private_data_len)
>>> +	if (check_add_overflow(offset, conn_param->private_data_len, &req.private_data_len))
>>> 		return -EINVAL;
>> 
>> The same check exists in cma_resolve_ib_udp too.
> 
> Thanks for pointing it out Leon. Will send a v2.

Be aware, will change $Subject slightly.


Håkon

> 
> 
> Thxs, Håkon
> 
>> 
>> Thanks
>> 
>>> 
>>> 	if (req.private_data_len) {
>>> -- 
>>> 1.8.3.1
diff mbox series

Patch

diff --git a/drivers/infiniband/core/cma.c b/drivers/infiniband/core/cma.c
index 835ac54..0435768 100644
--- a/drivers/infiniband/core/cma.c
+++ b/drivers/infiniband/core/cma.c
@@ -4093,8 +4093,7 @@  static int cma_connect_ib(struct rdma_id_private *id_priv,
 
 	memset(&req, 0, sizeof req);
 	offset = cma_user_data_offset(id_priv);
-	req.private_data_len = offset + conn_param->private_data_len;
-	if (req.private_data_len < conn_param->private_data_len)
+	if (check_add_overflow(offset, conn_param->private_data_len, &req.private_data_len))
 		return -EINVAL;
 
 	if (req.private_data_len) {