Received: by 10.192.165.148 with SMTP id m20csp2531269imm; Sun, 22 Apr 2018 09:00:14 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/FljpWu/9XOWWrVMiIsrtz44D10Npx1ct6YyCiW/QbJWzopxDHeWkjiO1ZprfK5+VyXQeK X-Received: by 2002:a17:902:b187:: with SMTP id s7-v6mr17945858plr.170.1524412814629; Sun, 22 Apr 2018 09:00:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524412814; cv=none; d=google.com; s=arc-20160816; b=1KRIZv/chgbcrdvOi24ryFDyk0S0PNHMGRO59mnEFbCRgjRBMhsyE8BNig1zRRJ0eS nZaFyfoFsfF1+JooHYXmDIBnLZYlCD/p9CWZluXupCIU92SThrKI45Z7LDMZfPaoAxLT 92unx975v563CSmyX6wbNIM2VP4jMUfVk1B8nCyobYErU1h7Emrup9xFn1lMtppKRhsq c5mebSz5zan+GgBhKrAa12Poy1StWaScfB29yjRDC+YGa/EOtrYYWRNASWS6kc7XqPP/ h+uuxnGQpKABOGFMAUKrcH8TVy4g6l0QkbuU+k5xKk0mpxXDG/3z4KcVx3sVXluhjacZ 5U0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=gfGrXawqkSpgdkCfAY32VQV8Xu6AzP8CjWr6LTA8mpE=; b=GVlymDfuPDbISYAL5LyNf4HRbgzoqa4VwNr54xs5/QhV2pFxlzWQ6xdbpgyUmXV5ow i1MvW5Ns+i5nxLOmRKqhLQ03h/FnaLoR6S3/LYwz70WpG8u+n8pKVjqWuXqORIPRUg3E JO0K2GrX1dkbDX+iLKRVABtDwqQFOH77/uWxeeHJdWFEeTv63uUR3myy5porrliRffmp BQ7pN97WriuJooYiQpM0+nBexUNzMuCELAJZTNV96wXOvDOF2GD74uREoS2Y18nXb9A5 yFsEDEtbvhnutc89r1lAL4+3Ug3qLr2QKgbNmloBMDhqFxejj4fazXaE6T+DeXOtoYhV huWw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q26si7958397pgv.585.2018.04.22.09.00.00; Sun, 22 Apr 2018 09:00:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754556AbeDVP6y (ORCPT + 99 others); Sun, 22 Apr 2018 11:58:54 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:46518 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753529AbeDVN7D (ORCPT ); Sun, 22 Apr 2018 09:59:03 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 564B0CF3; Sun, 22 Apr 2018 13:59:02 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Bart Van Assche , Steve Wise , Sagi Grimberg , Jason Gunthorpe Subject: [PATCH 4.16 105/196] RDMA/core: Avoid that ib_drain_qp() triggers an out-of-bounds stack access Date: Sun, 22 Apr 2018 15:52:05 +0200 Message-Id: <20180422135109.681220786@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180422135104.278511750@linuxfoundation.org> References: <20180422135104.278511750@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.16-stable review patch. If anyone has any objections, please let me know. ------------------ From: Bart Van Assche commit a1ae7d0345edd593d6725d3218434d903a0af95d upstream. This patch fixes the following KASAN complaint: ================================================================== BUG: KASAN: stack-out-of-bounds in rxe_post_send+0x77d/0x9b0 [rdma_rxe] Read of size 8 at addr ffff880061aef860 by task 01/1080 CPU: 2 PID: 1080 Comm: 01 Not tainted 4.16.0-rc3-dbg+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.0.0-prebuilt.qemu-project.org 04/01/2014 Call Trace: dump_stack+0x85/0xc7 print_address_description+0x65/0x270 kasan_report+0x231/0x350 rxe_post_send+0x77d/0x9b0 [rdma_rxe] __ib_drain_sq+0x1ad/0x250 [ib_core] ib_drain_qp+0x9/0x30 [ib_core] srp_destroy_qp+0x51/0x70 [ib_srp] srp_free_ch_ib+0xfc/0x380 [ib_srp] srp_create_target+0x1071/0x19e0 [ib_srp] kernfs_fop_write+0x180/0x210 __vfs_write+0xb1/0x2e0 vfs_write+0xf6/0x250 SyS_write+0x99/0x110 do_syscall_64+0xee/0x2b0 entry_SYSCALL_64_after_hwframe+0x42/0xb7 The buggy address belongs to the page: page:ffffea000186bbc0 count:0 mapcount:0 mapping:0000000000000000 index:0x0 flags: 0x4000000000000000() raw: 4000000000000000 0000000000000000 0000000000000000 00000000ffffffff raw: 0000000000000000 ffffea000186bbe0 0000000000000000 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff880061aef700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff880061aef780: 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 >ffff880061aef800: f2 f2 f2 f2 f2 f2 f2 00 00 00 00 00 f2 f2 f2 f2 ^ ffff880061aef880: f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 f2 f2 ffff880061aef900: f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== Fixes: 765d67748bcf ("IB: new common API for draining queues") Signed-off-by: Bart Van Assche Cc: Steve Wise Cc: Sagi Grimberg Cc: stable@vger.kernel.org Signed-off-by: Jason Gunthorpe Signed-off-by: Greg Kroah-Hartman --- drivers/infiniband/core/verbs.c | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) --- a/drivers/infiniband/core/verbs.c +++ b/drivers/infiniband/core/verbs.c @@ -2194,7 +2194,13 @@ static void __ib_drain_sq(struct ib_qp * struct ib_cq *cq = qp->send_cq; struct ib_qp_attr attr = { .qp_state = IB_QPS_ERR }; struct ib_drain_cqe sdrain; - struct ib_send_wr swr = {}, *bad_swr; + struct ib_send_wr *bad_swr; + struct ib_rdma_wr swr = { + .wr = { + .opcode = IB_WR_RDMA_WRITE, + .wr_cqe = &sdrain.cqe, + }, + }; int ret; ret = ib_modify_qp(qp, &attr, IB_QP_STATE); @@ -2203,11 +2209,10 @@ static void __ib_drain_sq(struct ib_qp * return; } - swr.wr_cqe = &sdrain.cqe; sdrain.cqe.done = ib_drain_qp_done; init_completion(&sdrain.done); - ret = ib_post_send(qp, &swr, &bad_swr); + ret = ib_post_send(qp, &swr.wr, &bad_swr); if (ret) { WARN_ONCE(ret, "failed to drain send queue: %d\n", ret); return;