* [PATCH rdma-core] verbs: Do not copy uninitialized data in ibv_cmd_modify_qp
@ 2016-12-22 22:13 Jason Gunthorpe
[not found] ` <20161222221334.GA15907-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
0 siblings, 1 reply; 6+ messages in thread
From: Jason Gunthorpe @ 2016-12-22 22:13 UTC (permalink / raw)
To: Doug Ledford, Leon Romanovsky, Yishai Hadas
Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA
Valgrind reports:
==1196== Syscall param write(buf) points to uninitialised byte(s)
==1196== at 0x506250D: ??? (syscall-template.S:84)
==1196== by 0x527756F: ibv_cmd_modify_qp (cmd.c:1291)
==1196== by 0x8008D74: mlx4_modify_qp (verbs.c:820)
==1196== by 0x527E4F4: ibv_modify_qp@@IBVERBS_1.1 (verbs.c:561)
==1196== by 0x4E3FAB3: ucma_modify_qp_err.isra.6 (cma.c:1115)
==1196== by 0x4E41D56: rdma_get_cm_event.part.15 (cma.c:2180)
==1196== by 0x402CF0: cm_thread (rping.c:576)
==1196== by 0x5059709: start_thread (pthread_create.c:333)
==1196== by 0x558A82C: clone (clone.S:109)
==1196== Address 0x9847980 is on thread 2's stack
==1196== in frame #2, created by mlx4_modify_qp (verbs.c:775)
This is because of code like this:
struct ibv_qp_attr qp_attr;
qp_attr.qp_state = IBV_QPS_ERR;
return rdma_seterrno(ibv_modify_qp(id->qp, &qp_attr, IBV_QP_STATE));
Always pass 0 into the kernel for for attributes that are not requested
to be modified.
Signed-off-by: Jason Gunthorpe <jgunthorpe-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
---
libibverbs/cmd.c | 170 +++++++++++++++++++++++++++++++++++++++----------------
1 file changed, 121 insertions(+), 49 deletions(-)
Shown with rping
Please double check my if's.. I followed the man page
I think there will be other cases where we do this wrong as well :\
diff --git a/libibverbs/cmd.c b/libibverbs/cmd.c
index 38061892da0de0..a702d67b05f2a3 100644
--- a/libibverbs/cmd.c
+++ b/libibverbs/cmd.c
@@ -1221,55 +1221,127 @@ int ibv_cmd_modify_qp(struct ibv_qp *qp, struct ibv_qp_attr *attr,
{
IBV_INIT_CMD(cmd, cmd_size, MODIFY_QP);
- cmd->qp_handle = qp->handle;
- cmd->attr_mask = attr_mask;
- cmd->qkey = attr->qkey;
- cmd->rq_psn = attr->rq_psn;
- cmd->sq_psn = attr->sq_psn;
- cmd->dest_qp_num = attr->dest_qp_num;
- cmd->qp_access_flags = attr->qp_access_flags;
- cmd->pkey_index = attr->pkey_index;
- cmd->alt_pkey_index = attr->alt_pkey_index;
- cmd->qp_state = attr->qp_state;
- cmd->cur_qp_state = attr->cur_qp_state;
- cmd->path_mtu = attr->path_mtu;
- cmd->path_mig_state = attr->path_mig_state;
- cmd->en_sqd_async_notify = attr->en_sqd_async_notify;
- cmd->max_rd_atomic = attr->max_rd_atomic;
- cmd->max_dest_rd_atomic = attr->max_dest_rd_atomic;
- cmd->min_rnr_timer = attr->min_rnr_timer;
- cmd->port_num = attr->port_num;
- cmd->timeout = attr->timeout;
- cmd->retry_cnt = attr->retry_cnt;
- cmd->rnr_retry = attr->rnr_retry;
- cmd->alt_port_num = attr->alt_port_num;
- cmd->alt_timeout = attr->alt_timeout;
-
- memcpy(cmd->dest.dgid, attr->ah_attr.grh.dgid.raw, 16);
- cmd->dest.flow_label = attr->ah_attr.grh.flow_label;
- cmd->dest.dlid = attr->ah_attr.dlid;
- cmd->dest.reserved = 0;
- cmd->dest.sgid_index = attr->ah_attr.grh.sgid_index;
- cmd->dest.hop_limit = attr->ah_attr.grh.hop_limit;
- cmd->dest.traffic_class = attr->ah_attr.grh.traffic_class;
- cmd->dest.sl = attr->ah_attr.sl;
- cmd->dest.src_path_bits = attr->ah_attr.src_path_bits;
- cmd->dest.static_rate = attr->ah_attr.static_rate;
- cmd->dest.is_global = attr->ah_attr.is_global;
- cmd->dest.port_num = attr->ah_attr.port_num;
-
- memcpy(cmd->alt_dest.dgid, attr->alt_ah_attr.grh.dgid.raw, 16);
- cmd->alt_dest.flow_label = attr->alt_ah_attr.grh.flow_label;
- cmd->alt_dest.dlid = attr->alt_ah_attr.dlid;
- cmd->alt_dest.reserved = 0;
- cmd->alt_dest.sgid_index = attr->alt_ah_attr.grh.sgid_index;
- cmd->alt_dest.hop_limit = attr->alt_ah_attr.grh.hop_limit;
- cmd->alt_dest.traffic_class = attr->alt_ah_attr.grh.traffic_class;
- cmd->alt_dest.sl = attr->alt_ah_attr.sl;
- cmd->alt_dest.src_path_bits = attr->alt_ah_attr.src_path_bits;
- cmd->alt_dest.static_rate = attr->alt_ah_attr.static_rate;
- cmd->alt_dest.is_global = attr->alt_ah_attr.is_global;
- cmd->alt_dest.port_num = attr->alt_ah_attr.port_num;
+ cmd->qp_handle = qp->handle;
+ cmd->attr_mask = attr_mask;
+
+ if (attr_mask & IBV_QP_STATE)
+ cmd->qp_state = attr->qp_state;
+ else
+ cmd->qp_state = 0;
+
+ if (attr_mask & IBV_QP_CUR_STATE)
+ cmd->cur_qp_state = attr->cur_qp_state;
+ else
+ cmd->cur_qp_state = 0;
+
+ if (attr_mask & IBV_QP_EN_SQD_ASYNC_NOTIFY)
+ cmd->en_sqd_async_notify = attr->en_sqd_async_notify;
+ else
+ cmd->en_sqd_async_notify = 0;
+
+ if (attr_mask & IBV_QP_ACCESS_FLAGS)
+ cmd->qp_access_flags = attr->qp_access_flags;
+ else
+ cmd->qp_access_flags = 0;
+ if (attr_mask & IBV_QP_PKEY_INDEX)
+ cmd->pkey_index = attr->pkey_index;
+ else
+ cmd->pkey_index = 0;
+ if (attr_mask & IBV_QP_PORT)
+ cmd->port_num = attr->port_num;
+ else
+ cmd->port_num = 0;
+ if (attr_mask & IBV_QP_QKEY)
+ cmd->qkey = attr->qkey;
+ else
+ cmd->qkey = 0;
+
+ if (attr_mask & IBV_QP_AV) {
+ memcpy(cmd->dest.dgid, attr->ah_attr.grh.dgid.raw, 16);
+ cmd->dest.flow_label = attr->ah_attr.grh.flow_label;
+ cmd->dest.dlid = attr->ah_attr.dlid;
+ cmd->dest.reserved = 0;
+ cmd->dest.sgid_index = attr->ah_attr.grh.sgid_index;
+ cmd->dest.hop_limit = attr->ah_attr.grh.hop_limit;
+ cmd->dest.traffic_class = attr->ah_attr.grh.traffic_class;
+ cmd->dest.sl = attr->ah_attr.sl;
+ cmd->dest.src_path_bits = attr->ah_attr.src_path_bits;
+ cmd->dest.static_rate = attr->ah_attr.static_rate;
+ cmd->dest.is_global = attr->ah_attr.is_global;
+ cmd->dest.port_num = attr->ah_attr.port_num;
+ } else
+ memset(&cmd->dest, 0, sizeof(cmd->dest));
+
+ if (attr_mask & IBV_QP_PATH_MTU)
+ cmd->path_mtu = attr->path_mtu;
+ else
+ cmd->path_mtu = 0;
+ if (attr_mask & IBV_QP_TIMEOUT)
+ cmd->timeout = attr->timeout;
+ else
+ cmd->timeout = 0;
+ if (attr_mask & IBV_QP_RETRY_CNT)
+ cmd->retry_cnt = attr->retry_cnt;
+ else
+ cmd->retry_cnt = 0;
+ if (attr_mask & IBV_QP_RNR_RETRY)
+ cmd->rnr_retry = attr->rnr_retry;
+ else
+ cmd->rnr_retry = 0;
+ if (attr_mask & IBV_QP_RQ_PSN)
+ cmd->rq_psn = attr->rq_psn;
+ else
+ cmd->rq_psn = 0;
+ if (attr_mask & IBV_QP_MAX_QP_RD_ATOMIC)
+ cmd->max_rd_atomic = attr->max_rd_atomic;
+ else
+ cmd->max_rd_atomic = 0;
+
+ if (attr_mask & IBV_QP_ALT_PATH) {
+ cmd->alt_pkey_index = attr->alt_pkey_index;
+ cmd->alt_port_num = attr->alt_port_num;
+ cmd->alt_timeout = attr->alt_timeout;
+
+ memcpy(cmd->alt_dest.dgid, attr->alt_ah_attr.grh.dgid.raw, 16);
+ cmd->alt_dest.flow_label = attr->alt_ah_attr.grh.flow_label;
+ cmd->alt_dest.dlid = attr->alt_ah_attr.dlid;
+ cmd->alt_dest.reserved = 0;
+ cmd->alt_dest.sgid_index = attr->alt_ah_attr.grh.sgid_index;
+ cmd->alt_dest.hop_limit = attr->alt_ah_attr.grh.hop_limit;
+ cmd->alt_dest.traffic_class =
+ attr->alt_ah_attr.grh.traffic_class;
+ cmd->alt_dest.sl = attr->alt_ah_attr.sl;
+ cmd->alt_dest.src_path_bits = attr->alt_ah_attr.src_path_bits;
+ cmd->alt_dest.static_rate = attr->alt_ah_attr.static_rate;
+ cmd->alt_dest.is_global = attr->alt_ah_attr.is_global;
+ cmd->alt_dest.port_num = attr->alt_ah_attr.port_num;
+ } else {
+ cmd->alt_pkey_index = 0;
+ cmd->alt_port_num = 0;
+ cmd->alt_timeout = 0;
+ memset(&cmd->alt_dest, 0, sizeof(cmd->alt_dest));
+ }
+
+ if (attr_mask & IBV_QP_MIN_RNR_TIMER)
+ cmd->min_rnr_timer = attr->min_rnr_timer;
+ else
+ cmd->min_rnr_timer = 0;
+ if (attr_mask & IBV_QP_SQ_PSN)
+ cmd->sq_psn = attr->sq_psn;
+ else
+ cmd->sq_psn = 0;
+ if (attr_mask & IBV_QP_MAX_DEST_RD_ATOMIC)
+ cmd->max_dest_rd_atomic = attr->max_dest_rd_atomic;
+ else
+ cmd->max_dest_rd_atomic = 0;
+ if (attr_mask & IBV_QP_PATH_MIG_STATE)
+ cmd->path_mig_state = attr->path_mig_state;
+ else
+ cmd->path_mig_state = 0;
+ if (attr_mask & IBV_QP_DEST_QPN)
+ cmd->dest_qp_num = attr->dest_qp_num;
+ else
+ cmd->dest_qp_num = 0;
cmd->reserved[0] = cmd->reserved[1] = 0;
--
2.7.4
--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply related [flat|nested] 6+ messages in thread[parent not found: <20161222221334.GA15907-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>]
* Re: [PATCH rdma-core] verbs: Do not copy uninitialized data in ibv_cmd_modify_qp [not found] ` <20161222221334.GA15907-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org> @ 2016-12-23 12:11 ` Doug Ledford 2016-12-25 7:42 ` Leon Romanovsky 2017-01-02 8:02 ` Bart Van Assche 2 siblings, 0 replies; 6+ messages in thread From: Doug Ledford @ 2016-12-23 12:11 UTC (permalink / raw) To: Jason Gunthorpe, Leon Romanovsky, Yishai Hadas Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA [-- Attachment #1.1: Type: text/plain, Size: 1417 bytes --] On 12/22/2016 5:13 PM, Jason Gunthorpe wrote: > Valgrind reports: > > ==1196== Syscall param write(buf) points to uninitialised byte(s) > ==1196== at 0x506250D: ??? (syscall-template.S:84) > ==1196== by 0x527756F: ibv_cmd_modify_qp (cmd.c:1291) > ==1196== by 0x8008D74: mlx4_modify_qp (verbs.c:820) > ==1196== by 0x527E4F4: ibv_modify_qp@@IBVERBS_1.1 (verbs.c:561) > ==1196== by 0x4E3FAB3: ucma_modify_qp_err.isra.6 (cma.c:1115) > ==1196== by 0x4E41D56: rdma_get_cm_event.part.15 (cma.c:2180) > ==1196== by 0x402CF0: cm_thread (rping.c:576) > ==1196== by 0x5059709: start_thread (pthread_create.c:333) > ==1196== by 0x558A82C: clone (clone.S:109) > ==1196== Address 0x9847980 is on thread 2's stack > ==1196== in frame #2, created by mlx4_modify_qp (verbs.c:775) > > This is because of code like this: > > struct ibv_qp_attr qp_attr; > qp_attr.qp_state = IBV_QPS_ERR; > return rdma_seterrno(ibv_modify_qp(id->qp, &qp_attr, IBV_QP_STATE)); > > Always pass 0 into the kernel for for attributes that are not requested > to be modified. > > Signed-off-by: Jason Gunthorpe <jgunthorpe-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org> Thanks, applied. -- Doug Ledford <dledford-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> GPG Key ID: B826A3330E572FDD Key fingerprint = AE6B 1BDA 122B 23B4 265B 1274 B826 A333 0E57 2FDD [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 884 bytes --] ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH rdma-core] verbs: Do not copy uninitialized data in ibv_cmd_modify_qp [not found] ` <20161222221334.GA15907-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org> 2016-12-23 12:11 ` Doug Ledford @ 2016-12-25 7:42 ` Leon Romanovsky 2017-01-02 8:02 ` Bart Van Assche 2 siblings, 0 replies; 6+ messages in thread From: Leon Romanovsky @ 2016-12-25 7:42 UTC (permalink / raw) To: Jason Gunthorpe Cc: Doug Ledford, Yishai Hadas, linux-rdma-u79uwXL29TY76Z2rM5mHXA [-- Attachment #1: Type: text/plain, Size: 8492 bytes --] On Thu, Dec 22, 2016 at 03:13:34PM -0700, Jason Gunthorpe wrote: > Valgrind reports: > > ==1196== Syscall param write(buf) points to uninitialised byte(s) > ==1196== at 0x506250D: ??? (syscall-template.S:84) > ==1196== by 0x527756F: ibv_cmd_modify_qp (cmd.c:1291) > ==1196== by 0x8008D74: mlx4_modify_qp (verbs.c:820) > ==1196== by 0x527E4F4: ibv_modify_qp@@IBVERBS_1.1 (verbs.c:561) > ==1196== by 0x4E3FAB3: ucma_modify_qp_err.isra.6 (cma.c:1115) > ==1196== by 0x4E41D56: rdma_get_cm_event.part.15 (cma.c:2180) > ==1196== by 0x402CF0: cm_thread (rping.c:576) > ==1196== by 0x5059709: start_thread (pthread_create.c:333) > ==1196== by 0x558A82C: clone (clone.S:109) > ==1196== Address 0x9847980 is on thread 2's stack > ==1196== in frame #2, created by mlx4_modify_qp (verbs.c:775) > > This is because of code like this: > > struct ibv_qp_attr qp_attr; > qp_attr.qp_state = IBV_QPS_ERR; > return rdma_seterrno(ibv_modify_qp(id->qp, &qp_attr, IBV_QP_STATE)); > > Always pass 0 into the kernel for for attributes that are not requested > to be modified. > > Signed-off-by: Jason Gunthorpe <jgunthorpe-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org> > --- > libibverbs/cmd.c | 170 +++++++++++++++++++++++++++++++++++++++---------------- > 1 file changed, 121 insertions(+), 49 deletions(-) > > Shown with rping > > Please double check my if's.. I followed the man page > > I think there will be other cases where we do this wrong as well :\ > > diff --git a/libibverbs/cmd.c b/libibverbs/cmd.c > index 38061892da0de0..a702d67b05f2a3 100644 > --- a/libibverbs/cmd.c > +++ b/libibverbs/cmd.c > @@ -1221,55 +1221,127 @@ int ibv_cmd_modify_qp(struct ibv_qp *qp, struct ibv_qp_attr *attr, > { > IBV_INIT_CMD(cmd, cmd_size, MODIFY_QP); I didn't check all ibv_* commands but for ibv_cmd_modify_qp callers, there are no callers which change cmd before this call. It looks like it is safe to replace all cmd->* = 0 with one global memset(). Maybe it is safe to put this memset in IBV_INIT_CMD too. > > - cmd->qp_handle = qp->handle; > - cmd->attr_mask = attr_mask; > - cmd->qkey = attr->qkey; > - cmd->rq_psn = attr->rq_psn; > - cmd->sq_psn = attr->sq_psn; > - cmd->dest_qp_num = attr->dest_qp_num; > - cmd->qp_access_flags = attr->qp_access_flags; > - cmd->pkey_index = attr->pkey_index; > - cmd->alt_pkey_index = attr->alt_pkey_index; > - cmd->qp_state = attr->qp_state; > - cmd->cur_qp_state = attr->cur_qp_state; > - cmd->path_mtu = attr->path_mtu; > - cmd->path_mig_state = attr->path_mig_state; > - cmd->en_sqd_async_notify = attr->en_sqd_async_notify; > - cmd->max_rd_atomic = attr->max_rd_atomic; > - cmd->max_dest_rd_atomic = attr->max_dest_rd_atomic; > - cmd->min_rnr_timer = attr->min_rnr_timer; > - cmd->port_num = attr->port_num; > - cmd->timeout = attr->timeout; > - cmd->retry_cnt = attr->retry_cnt; > - cmd->rnr_retry = attr->rnr_retry; > - cmd->alt_port_num = attr->alt_port_num; > - cmd->alt_timeout = attr->alt_timeout; > - > - memcpy(cmd->dest.dgid, attr->ah_attr.grh.dgid.raw, 16); > - cmd->dest.flow_label = attr->ah_attr.grh.flow_label; > - cmd->dest.dlid = attr->ah_attr.dlid; > - cmd->dest.reserved = 0; > - cmd->dest.sgid_index = attr->ah_attr.grh.sgid_index; > - cmd->dest.hop_limit = attr->ah_attr.grh.hop_limit; > - cmd->dest.traffic_class = attr->ah_attr.grh.traffic_class; > - cmd->dest.sl = attr->ah_attr.sl; > - cmd->dest.src_path_bits = attr->ah_attr.src_path_bits; > - cmd->dest.static_rate = attr->ah_attr.static_rate; > - cmd->dest.is_global = attr->ah_attr.is_global; > - cmd->dest.port_num = attr->ah_attr.port_num; > - > - memcpy(cmd->alt_dest.dgid, attr->alt_ah_attr.grh.dgid.raw, 16); > - cmd->alt_dest.flow_label = attr->alt_ah_attr.grh.flow_label; > - cmd->alt_dest.dlid = attr->alt_ah_attr.dlid; > - cmd->alt_dest.reserved = 0; > - cmd->alt_dest.sgid_index = attr->alt_ah_attr.grh.sgid_index; > - cmd->alt_dest.hop_limit = attr->alt_ah_attr.grh.hop_limit; > - cmd->alt_dest.traffic_class = attr->alt_ah_attr.grh.traffic_class; > - cmd->alt_dest.sl = attr->alt_ah_attr.sl; > - cmd->alt_dest.src_path_bits = attr->alt_ah_attr.src_path_bits; > - cmd->alt_dest.static_rate = attr->alt_ah_attr.static_rate; > - cmd->alt_dest.is_global = attr->alt_ah_attr.is_global; > - cmd->alt_dest.port_num = attr->alt_ah_attr.port_num; > + cmd->qp_handle = qp->handle; > + cmd->attr_mask = attr_mask; > + > + if (attr_mask & IBV_QP_STATE) > + cmd->qp_state = attr->qp_state; > + else > + cmd->qp_state = 0; > + > + if (attr_mask & IBV_QP_CUR_STATE) > + cmd->cur_qp_state = attr->cur_qp_state; > + else > + cmd->cur_qp_state = 0; > + > + if (attr_mask & IBV_QP_EN_SQD_ASYNC_NOTIFY) > + cmd->en_sqd_async_notify = attr->en_sqd_async_notify; > + else > + cmd->en_sqd_async_notify = 0; > + > + if (attr_mask & IBV_QP_ACCESS_FLAGS) > + cmd->qp_access_flags = attr->qp_access_flags; > + else > + cmd->qp_access_flags = 0; > + if (attr_mask & IBV_QP_PKEY_INDEX) > + cmd->pkey_index = attr->pkey_index; > + else > + cmd->pkey_index = 0; > + if (attr_mask & IBV_QP_PORT) > + cmd->port_num = attr->port_num; > + else > + cmd->port_num = 0; > + if (attr_mask & IBV_QP_QKEY) > + cmd->qkey = attr->qkey; > + else > + cmd->qkey = 0; > + > + if (attr_mask & IBV_QP_AV) { > + memcpy(cmd->dest.dgid, attr->ah_attr.grh.dgid.raw, 16); > + cmd->dest.flow_label = attr->ah_attr.grh.flow_label; > + cmd->dest.dlid = attr->ah_attr.dlid; > + cmd->dest.reserved = 0; > + cmd->dest.sgid_index = attr->ah_attr.grh.sgid_index; > + cmd->dest.hop_limit = attr->ah_attr.grh.hop_limit; > + cmd->dest.traffic_class = attr->ah_attr.grh.traffic_class; > + cmd->dest.sl = attr->ah_attr.sl; > + cmd->dest.src_path_bits = attr->ah_attr.src_path_bits; > + cmd->dest.static_rate = attr->ah_attr.static_rate; > + cmd->dest.is_global = attr->ah_attr.is_global; > + cmd->dest.port_num = attr->ah_attr.port_num; > + } else > + memset(&cmd->dest, 0, sizeof(cmd->dest)); > + > + if (attr_mask & IBV_QP_PATH_MTU) > + cmd->path_mtu = attr->path_mtu; > + else > + cmd->path_mtu = 0; > + if (attr_mask & IBV_QP_TIMEOUT) > + cmd->timeout = attr->timeout; > + else > + cmd->timeout = 0; > + if (attr_mask & IBV_QP_RETRY_CNT) > + cmd->retry_cnt = attr->retry_cnt; > + else > + cmd->retry_cnt = 0; > + if (attr_mask & IBV_QP_RNR_RETRY) > + cmd->rnr_retry = attr->rnr_retry; > + else > + cmd->rnr_retry = 0; > + if (attr_mask & IBV_QP_RQ_PSN) > + cmd->rq_psn = attr->rq_psn; > + else > + cmd->rq_psn = 0; > + if (attr_mask & IBV_QP_MAX_QP_RD_ATOMIC) > + cmd->max_rd_atomic = attr->max_rd_atomic; > + else > + cmd->max_rd_atomic = 0; > + > + if (attr_mask & IBV_QP_ALT_PATH) { > + cmd->alt_pkey_index = attr->alt_pkey_index; > + cmd->alt_port_num = attr->alt_port_num; > + cmd->alt_timeout = attr->alt_timeout; > + > + memcpy(cmd->alt_dest.dgid, attr->alt_ah_attr.grh.dgid.raw, 16); > + cmd->alt_dest.flow_label = attr->alt_ah_attr.grh.flow_label; > + cmd->alt_dest.dlid = attr->alt_ah_attr.dlid; > + cmd->alt_dest.reserved = 0; > + cmd->alt_dest.sgid_index = attr->alt_ah_attr.grh.sgid_index; > + cmd->alt_dest.hop_limit = attr->alt_ah_attr.grh.hop_limit; > + cmd->alt_dest.traffic_class = > + attr->alt_ah_attr.grh.traffic_class; > + cmd->alt_dest.sl = attr->alt_ah_attr.sl; > + cmd->alt_dest.src_path_bits = attr->alt_ah_attr.src_path_bits; > + cmd->alt_dest.static_rate = attr->alt_ah_attr.static_rate; > + cmd->alt_dest.is_global = attr->alt_ah_attr.is_global; > + cmd->alt_dest.port_num = attr->alt_ah_attr.port_num; > + } else { > + cmd->alt_pkey_index = 0; > + cmd->alt_port_num = 0; > + cmd->alt_timeout = 0; > + memset(&cmd->alt_dest, 0, sizeof(cmd->alt_dest)); > + } > + > + if (attr_mask & IBV_QP_MIN_RNR_TIMER) > + cmd->min_rnr_timer = attr->min_rnr_timer; > + else > + cmd->min_rnr_timer = 0; > + if (attr_mask & IBV_QP_SQ_PSN) > + cmd->sq_psn = attr->sq_psn; > + else > + cmd->sq_psn = 0; > + if (attr_mask & IBV_QP_MAX_DEST_RD_ATOMIC) > + cmd->max_dest_rd_atomic = attr->max_dest_rd_atomic; > + else > + cmd->max_dest_rd_atomic = 0; > + if (attr_mask & IBV_QP_PATH_MIG_STATE) > + cmd->path_mig_state = attr->path_mig_state; > + else > + cmd->path_mig_state = 0; > + if (attr_mask & IBV_QP_DEST_QPN) > + cmd->dest_qp_num = attr->dest_qp_num; > + else > + cmd->dest_qp_num = 0; > > cmd->reserved[0] = cmd->reserved[1] = 0; > > -- > 2.7.4 [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH rdma-core] verbs: Do not copy uninitialized data in ibv_cmd_modify_qp [not found] ` <20161222221334.GA15907-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org> 2016-12-23 12:11 ` Doug Ledford 2016-12-25 7:42 ` Leon Romanovsky @ 2017-01-02 8:02 ` Bart Van Assche [not found] ` <1483344105.3592.1.camel-XdAiOPVOjttBDgjK7y7TUQ@public.gmane.org> 2 siblings, 1 reply; 6+ messages in thread From: Bart Van Assche @ 2017-01-02 8:02 UTC (permalink / raw) To: jgunthorpe-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org, yishaih-LDSdmyG8hGV8YrgS2mwiifqBs+8SCbDb@public.gmane.org, dledford-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org, leon-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org [-- Warning: decoded text below may be mangled, UTF-8 assumed --] [-- Attachment #1: Type: text/plain; charset="utf-8", Size: 1543 bytes --] On Thu, 2016-12-22 at 15:13 -0700, Jason Gunthorpe wrote: > Valgrind reports: > > ==1196== Syscall param write(buf) points to uninitialised byte(s) > ==1196== at 0x506250D: ??? (syscall-template.S:84) > ==1196== by 0x527756F: ibv_cmd_modify_qp (cmd.c:1291) > ==1196== by 0x8008D74: mlx4_modify_qp (verbs.c:820) > ==1196== by 0x527E4F4: ibv_modify_qp@@IBVERBS_1.1 (verbs.c:561) > ==1196== by 0x4E3FAB3: ucma_modify_qp_err.isra.6 (cma.c:1115) > ==1196== by 0x4E41D56: rdma_get_cm_event.part.15 (cma.c:2180) > ==1196== by 0x402CF0: cm_thread (rping.c:576) > ==1196== by 0x5059709: start_thread (pthread_create.c:333) > ==1196== by 0x558A82C: clone (clone.S:109) > ==1196== Address 0x9847980 is on thread 2's stack > ==1196== in frame #2, created by mlx4_modify_qp (verbs.c:775) > > This is because of code like this: > > struct ibv_qp_attr qp_attr; > qp_attr.qp_state = IBV_QPS_ERR; > return rdma_seterrno(ibv_modify_qp(id->qp, &qp_attr, IBV_QP_STATE)); > > Always pass 0 into the kernel for for attributes that are not requested > to be modified. Hello Jason, Have you considered to modify Valgrind? It is possible to modify Valgrind such that it doesn't report false positives like the above report without changing the rdma-core code. See also PRE(sys_ioctl) in source file coregrind/m_syswrap/syswrap-linux.c. Bart. N§²æìr¸yúèØb²X¬¶Ç§vØ^)Þº{.nÇ+·¥{±Ù{ayº\x1dÊÚë,j\a¢f£¢·h»öì\x17/oSc¾Ú³9uÀ¦æåÈ&jw¨®\x03(éÝ¢j"ú\x1a¶^[m§ÿïêäz¹Þàþf£¢·h§~m ^ permalink raw reply [flat|nested] 6+ messages in thread
[parent not found: <1483344105.3592.1.camel-XdAiOPVOjttBDgjK7y7TUQ@public.gmane.org>]
* Re: [PATCH rdma-core] verbs: Do not copy uninitialized data in ibv_cmd_modify_qp [not found] ` <1483344105.3592.1.camel-XdAiOPVOjttBDgjK7y7TUQ@public.gmane.org> @ 2017-01-02 21:14 ` Jason Gunthorpe [not found] ` <20170102211430.GC5544-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org> 0 siblings, 1 reply; 6+ messages in thread From: Jason Gunthorpe @ 2017-01-02 21:14 UTC (permalink / raw) To: Bart Van Assche Cc: yishaih-LDSdmyG8hGV8YrgS2mwiifqBs+8SCbDb@public.gmane.org, dledford-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org, leon-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org, linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org On Mon, Jan 02, 2017 at 08:02:02AM +0000, Bart Van Assche wrote: > On Thu, 2016-12-22 at 15:13 -0700, Jason Gunthorpe wrote: > > Valgrind reports: > > > > ==1196== Syscall param write(buf) points to uninitialised byte(s) > > ==1196== at 0x506250D: ??? (syscall-template.S:84) > > ==1196== by 0x527756F: ibv_cmd_modify_qp (cmd.c:1291) > > ==1196== by 0x8008D74: mlx4_modify_qp (verbs.c:820) > > ==1196== by 0x527E4F4: ibv_modify_qp@@IBVERBS_1.1 (verbs.c:561) > > ==1196== by 0x4E3FAB3: ucma_modify_qp_err.isra.6 (cma.c:1115) > > ==1196== by 0x4E41D56: rdma_get_cm_event.part.15 (cma.c:2180) > > ==1196== by 0x402CF0: cm_thread (rping.c:576) > > ==1196== by 0x5059709: start_thread (pthread_create.c:333) > > ==1196== by 0x558A82C: clone (clone.S:109) > > ==1196== Address 0x9847980 is on thread 2's stack > > ==1196== in frame #2, created by mlx4_modify_qp (verbs.c:775) > > > > This is because of code like this: > > > > struct ibv_qp_attr qp_attr; > > qp_attr.qp_state = IBV_QPS_ERR; > > return rdma_seterrno(ibv_modify_qp(id->qp, &qp_attr, IBV_QP_STATE)); > > > > Always pass 0 into the kernel for for attributes that are not requested > Have you considered to modify Valgrind? It is possible to modify Valgrind > such that it doesn't report false positives like the above report without > changing the rdma-core code. See also PRE(sys_ioctl) in source file > coregrind/m_syswrap/syswrap-linux.c. I felt that passing uninitialized memory into the kernel was just in general a bad idea, and adding the branchs to copy zero instead of un-init is probably performance neutral. Even so, I don't think we can fix valgrind, ioctl is a different case as ioctls are much more well defined, this is write() and valgrind would have to first know we are writing to a uverbs FD which seems challenging to determine, can valgrind already do this? Jason -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 6+ messages in thread
[parent not found: <20170102211430.GC5544-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>]
* Re: [PATCH rdma-core] verbs: Do not copy uninitialized data in ibv_cmd_modify_qp [not found] ` <20170102211430.GC5544-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org> @ 2017-01-03 8:36 ` Bart Van Assche 0 siblings, 0 replies; 6+ messages in thread From: Bart Van Assche @ 2017-01-03 8:36 UTC (permalink / raw) To: jgunthorpe-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org Cc: yishaih-LDSdmyG8hGV8YrgS2mwiifqBs+8SCbDb@public.gmane.org, linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, dledford-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org, leon-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org [-- Warning: decoded text below may be mangled, UTF-8 assumed --] [-- Attachment #1: Type: text/plain; charset="utf-8", Size: 967 bytes --] On Mon, 2017-01-02 at 14:14 -0700, Jason Gunthorpe wrote: > I felt that passing uninitialized memory into the kernel was just > in general a bad idea, and adding the branchs to copy zero instead of > un-init is probably performance neutral. > > Even so, I don't think we can fix valgrind, ioctl is a different case > as ioctls are much more well defined, this is write() and valgrind > would have to first know we are writing to a uverbs FD which seems > challenging to determine, can valgrind already do this? Hello Jason, As far as I know there is not yet any code in Valgrind to interpret the data sent from user space to kernel through the write() system call. Since I do not know any application for which ibv_modify_qp() is in the hot path I think modifying the ibv_modify_qp() implementation is fine. Bart.N§²æìr¸yúèØb²X¬¶Ç§vØ^)Þº{.nÇ+·¥{±Ù{ayº\x1dÊÚë,j\a¢f£¢·h»öì\x17/oSc¾Ú³9uÀ¦æåÈ&jw¨®\x03(éÝ¢j"ú\x1a¶^[m§ÿïêäz¹Þàþf£¢·h§~m ^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2017-01-03 8:36 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-12-22 22:13 [PATCH rdma-core] verbs: Do not copy uninitialized data in ibv_cmd_modify_qp Jason Gunthorpe
[not found] ` <20161222221334.GA15907-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
2016-12-23 12:11 ` Doug Ledford
2016-12-25 7:42 ` Leon Romanovsky
2017-01-02 8:02 ` Bart Van Assche
[not found] ` <1483344105.3592.1.camel-XdAiOPVOjttBDgjK7y7TUQ@public.gmane.org>
2017-01-02 21:14 ` Jason Gunthorpe
[not found] ` <20170102211430.GC5544-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
2017-01-03 8:36 ` Bart Van Assche
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox