Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2042944imm; Mon, 16 Jul 2018 00:45:29 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfAaoqhbPA1Jh/G0Ncf+c9DtBRjGZjWP0JGPt+J3s8176ZHD/X17jHSrBFMK/1gU4HG+Mne X-Received: by 2002:a17:902:6686:: with SMTP id e6-v6mr15628941plk.35.1531727129065; Mon, 16 Jul 2018 00:45:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531727129; cv=none; d=google.com; s=arc-20160816; b=AJ7CnRXyf3KD8EBhHKjlMNi5mPzoSnlnsRjZM37M/KhT4r8mN3D//ZrJGNE1IQg+xr CdLks6A+RGTXvADwcoehlf2Rj1sNxyFM1kmyJFHZeGDFfdOLYuJqQp3mmV0zjbtse+iS HJsdMVmlAd49FSWxyAG2MbjiHHetlktQ+wmdHGHw1sjKG8PrLK3XjAeVndf+XzXtCoju q19ZMF3Xd+zYcFqQdakbK2rHXQvf5WQIGwG6nvRBC9DXh04bi2LxKUA6dkaJg7UKA78l THiNDKbc/VF2V0K071Jn2H9Q/HDntBjgOUoSYfqwv1u6JmicIHJnwSK15EK/RUAIbegg Ul3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=eKjXRg9xRkmSeID/r4LD77s2sSsDgR1ySNe8oUkc4TM=; b=C3ieJEe0O070glOPkXSVxrxye2g1VkYLjUZsUTED6yIuABasuOQ2dqvHizsiCt1JCj caHUCV0RQs0/JUzHXJctj6kb+STu2i2N61nGiL4XJMe3yBNpSEBleOj6lHQVlzBA1oKX jh0RvbRCM54YMk5Ic+o3fEq2VNvriWi6liPWYEpqC79hwN0zr5v48BM/SdgF7sSM9wnT 9f8pZjfs9u+PPaTEi+DL/ttw2CNyYLxHc0GC9W0KFgDyaWDyttQpZZTAxNSdZH2rBun3 w2yMLT//iarA3hRyIyA/79T9qE8SA4EY2Myjn9TPzOx0TkaAaL/ZiNZCcbjEsZyV8JUi KtOQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t1-v6si28733422plo.241.2018.07.16.00.45.14; Mon, 16 Jul 2018 00:45:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389055AbeGPIJc (ORCPT + 99 others); Mon, 16 Jul 2018 04:09:32 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:48006 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388675AbeGPIJb (ORCPT ); Mon, 16 Jul 2018 04:09:31 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id ED252C03; Mon, 16 Jul 2018 07:43:27 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Leon Romanovsky , Jason Gunthorpe Subject: [PATCH 4.9 31/32] RDMA/ucm: Mark UCM interface as BROKEN Date: Mon, 16 Jul 2018 09:36:39 +0200 Message-Id: <20180716073508.329161069@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180716073504.433996952@linuxfoundation.org> References: <20180716073504.433996952@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Leon Romanovsky commit 7a8690ed6f5346f6738971892205e91d39b6b901 upstream. In commit 357d23c811a7 ("Remove the obsolete libibcm library") in rdma-core [1], we removed obsolete library which used the /dev/infiniband/ucmX interface. Following multiple syzkaller reports about non-sanitized user input in the UCMA module, the short audit reveals the same issues in UCM module too. It is better to disable this interface in the kernel, before syzkaller team invests time and energy to harden this unused interface. [1] https://github.com/linux-rdma/rdma-core/pull/279 Signed-off-by: Leon Romanovsky Signed-off-by: Jason Gunthorpe Signed-off-by: Greg Kroah-Hartman --- drivers/infiniband/Kconfig | 12 ++++++++++++ drivers/infiniband/core/Makefile | 4 ++-- 2 files changed, 14 insertions(+), 2 deletions(-) --- a/drivers/infiniband/Kconfig +++ b/drivers/infiniband/Kconfig @@ -34,6 +34,18 @@ config INFINIBAND_USER_ACCESS libibverbs, libibcm and a hardware driver library from . +config INFINIBAND_USER_ACCESS_UCM + bool "Userspace CM (UCM, DEPRECATED)" + depends on BROKEN + depends on INFINIBAND_USER_ACCESS + help + The UCM module has known security flaws, which no one is + interested to fix. The user-space part of this code was + dropped from the upstream a long time ago. + + This option is DEPRECATED and planned to be removed. + + config INFINIBAND_USER_MEM bool depends on INFINIBAND_USER_ACCESS != n --- a/drivers/infiniband/core/Makefile +++ b/drivers/infiniband/core/Makefile @@ -4,8 +4,8 @@ user_access-$(CONFIG_INFINIBAND_ADDR_TRA obj-$(CONFIG_INFINIBAND) += ib_core.o ib_cm.o iw_cm.o \ $(infiniband-y) obj-$(CONFIG_INFINIBAND_USER_MAD) += ib_umad.o -obj-$(CONFIG_INFINIBAND_USER_ACCESS) += ib_uverbs.o ib_ucm.o \ - $(user_access-y) +obj-$(CONFIG_INFINIBAND_USER_ACCESS) += ib_uverbs.o $(user_access-y) +obj-$(CONFIG_INFINIBAND_USER_ACCESS_UCM) += ib_ucm.o $(user_access-y) ib_core-y := packer.o ud_header.o verbs.o cq.o rw.o sysfs.o \ device.o fmr_pool.o cache.o netlink.o \