On 4/27/2021 3:44 AM, Chengchang Tang wrote:
> 
> 
> On 2021/4/26 22:54, Ferruh Yigit wrote:
>> On 4/22/2021 8:12 AM, Min Hu (Connor) wrote:
>>> From: Chengchang Tang <tangchengch...@huawei.com>
>>>
>>> The socket ID entered by user is cast to an unsigned integer. However,
>>> the value may be an illegal negative value, which may cause some
>>> problems. In this case, an error should be returned.
>>>
>>
>> +1 to fix
>>
>>> In addition, the socket ID may be an invalid positive number, which is
>>> also processed in this patch.
>>>
>>> Fixes: 2efb58cbab6e ("bond: new link bonding library")
>>> Cc: sta...@dpdk.org
>>>
>>> Signed-off-by: Chengchang Tang <tangchengch...@huawei.com>
>>> Signed-off-by: Min Hu (Connor) <humi...@huawei.com>
>>> ---
>>>  drivers/net/bonding/rte_eth_bond_args.c | 4 ++--
>>>  1 file changed, 2 insertions(+), 2 deletions(-)
>>>
>>> diff --git a/drivers/net/bonding/rte_eth_bond_args.c 
>>> b/drivers/net/bonding/rte_eth_bond_args.c
>>> index 8c5f90d..bcc0fe3 100644
>>> --- a/drivers/net/bonding/rte_eth_bond_args.c
>>> +++ b/drivers/net/bonding/rte_eth_bond_args.c
>>> @@ -207,12 +207,12 @@ bond_ethdev_parse_socket_id_kvarg(const char *key 
>>> __rte_unused,
>>>             return -1;
>>>  
>>>     errno = 0;
>>> -   socket_id = (uint8_t)strtol(value, &endptr, 10);
>>> +   socket_id = strtol(value, &endptr, 10);
>>
>> 'strtol()' returns 'long int', but implicitly casting it to 'int'. My 
>> concern is
>> if this cause a static analysis tool warning.
>> What do you think to have 'socket_id' type as 'long int'?
>>
> I think it would be better to cast to the 'int' here, for reasons below.
> 

Independent from below reasons, converting from user provided "long int" to
'int' will cause losing value and may lead wrong checks,

Like if user provided '-4294967281' (0xffffffff0000000f), when you cast to
'int', it will become '15' (0xf) and will pass from validation checks.

So I think better to verify the value first as "long int", later cast it to 
'int'.

>>>     if (*endptr != 0 || errno != 0)
>>>             return -1;
>>>  
>>>     /* validate socket id value */
>>> -   if (socket_id >= 0) {
>>> +   if (socket_id >= 0 && socket_id < RTE_MAX_NUMA_NODES) {>                
>>> *(uint8_t *)extra_args = (uint8_t)socket_id;
>>
>> Here there is an assumption that RTE_MAX_NUMA_NODES will be less than
>> 'UCHAR_MAX', perhaps it can be good to add a check to verify this assumption.
> 
> Currently, it is unlikely that RTE_MAX_NUMA_NODES will be greater than 256. 
> Therefore,
> adding such check will not cause any problems. But I don't think it's 
> necessary to put
> such restrictions on it (i.e. RTE_MAX_NUMA_NODES should be less than 
> UCHAR_MAX).

Restriction comes from provided 'extra_args' being 'uint8_t', I just suggest
checking this.

> I checked all references to RTE_MAX_NUMA_NODES, and usually socket_id is of 
> type 'int'
> or 'unsigned int' (Only the efd, node, and bonding specify 'unsigned char' 
> for socket
> IDs.). And for that, I think it will be better to change the socket id type 
> to 'int'
> in this patch. For the type of socket id in efd and node, I will send new 
> patches to
> modify it.
>>
>>>             return 0;
>>>     }
>>>
>>
>>
>> .
>>
> 

Reply via email to