From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7E0E32216A2; Fri, 4 Oct 2024 18:19:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728065954; cv=none; b=qNt5m5a4lB/+Nc7vVSI+6/cr/4ivwko1GwLWh2oPVhBssVBEpJLcN8KFJOJksHc7fQLBAv/dfTK1dM7d9dKfY/iV2fLwB1Zzl+GZ0lngDwDAlFMc8vjgrSqBbndmqhTRijLDasghYskHGmn+cG3w5TVCBknwql34KiNhdKgeXA0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728065954; c=relaxed/simple; bh=0a+Seo70NaweNCwlTC06rm6ofVOagReXXDNoRdVU5jI=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=qKubeCGIWeuwij1+ddRJLV2XxtvFRW/nIEQMGFuQdMMZQo824sApVPAWjOvCi+skF4QADPDD8h/L7XA1VUFm6bn22zCErsrv0SBih1uwOObDvZseXaMd0Xi6gerdJ9SYBmajxn9TzvEbbc1ihxD2XHN39E5ywKnJTEhQTlZFeCs= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=NW4XBTSn; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="NW4XBTSn" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1863DC4CECE; Fri, 4 Oct 2024 18:19:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1728065954; bh=0a+Seo70NaweNCwlTC06rm6ofVOagReXXDNoRdVU5jI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=NW4XBTSnhIpBuGlP2XapFdMZPwg521X/4cYM+vSRkA1qvoL9AcQHLkxfpzw3fkV2c P/rOzZyBIEY7FdEiVUNhrPbyffvSOg7H5ozZSxUkieJwSHhIa110u6T1A6aAQ2xM+7 nQiVKpdpyB+x4gCeY2+uZ2xkDXZIZgiv0yrj/kcl3QA2kZ758Un9HVdbGol1OAGlj7 n4QBhi04ECOsUF/tf2givLsixiFRetAAYdGqVIspiW4Q8M7f4saR9CReATuL4AoWaa oc++/ZzfdnSZRos4gR/0g2a0mll0bX5VUQQPuwLd/f8oJmq8mDvEqLcqiIYa53DoEf kWtvnvrSR5mRw== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Md Haris Iqbal , Jack Wang , Grzegorz Prajsner , Leon Romanovsky , Sasha Levin , linux-rdma@vger.kernel.org Subject: [PATCH AUTOSEL 6.11 25/76] RDMA/rtrs-srv: Avoid null pointer deref during path establishment Date: Fri, 4 Oct 2024 14:16:42 -0400 Message-ID: <20241004181828.3669209-25-sashal@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20241004181828.3669209-1-sashal@kernel.org> References: <20241004181828.3669209-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore X-stable-base: Linux 6.11.2 Content-Transfer-Encoding: 8bit From: Md Haris Iqbal [ Upstream commit d0e62bf7b575fbfe591f6f570e7595dd60a2f5eb ] For RTRS path establishment, RTRS client initiates and completes con_num of connections. After establishing all its connections, the information is exchanged between the client and server through the info_req message. During this exchange, it is essential that all connections have been established, and the state of the RTRS srv path is CONNECTED. So add these sanity checks, to make sure we detect and abort process in error scenarios to avoid null pointer deref. Signed-off-by: Md Haris Iqbal Signed-off-by: Jack Wang Signed-off-by: Grzegorz Prajsner Link: https://patch.msgid.link/20240821112217.41827-9-haris.iqbal@ionos.com Signed-off-by: Leon Romanovsky Signed-off-by: Sasha Levin --- drivers/infiniband/ulp/rtrs/rtrs-srv.c | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-) diff --git a/drivers/infiniband/ulp/rtrs/rtrs-srv.c b/drivers/infiniband/ulp/rtrs/rtrs-srv.c index 1d33efb8fb03b..e9835a1666d3a 100644 --- a/drivers/infiniband/ulp/rtrs/rtrs-srv.c +++ b/drivers/infiniband/ulp/rtrs/rtrs-srv.c @@ -931,12 +931,11 @@ static void rtrs_srv_info_req_done(struct ib_cq *cq, struct ib_wc *wc) if (err) goto close; -out: rtrs_iu_free(iu, srv_path->s.dev->ib_dev, 1); return; close: + rtrs_iu_free(iu, srv_path->s.dev->ib_dev, 1); close_path(srv_path); - goto out; } static int post_recv_info_req(struct rtrs_srv_con *con) @@ -987,6 +986,16 @@ static int post_recv_path(struct rtrs_srv_path *srv_path) q_size = SERVICE_CON_QUEUE_DEPTH; else q_size = srv->queue_depth; + if (srv_path->state != RTRS_SRV_CONNECTING) { + rtrs_err(s, "Path state invalid. state %s\n", + rtrs_srv_state_str(srv_path->state)); + return -EIO; + } + + if (!srv_path->s.con[cid]) { + rtrs_err(s, "Conn not set for %d\n", cid); + return -EIO; + } err = post_recv_io(to_srv_con(srv_path->s.con[cid]), q_size); if (err) { -- 2.43.0