Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2044083imm; Mon, 16 Jul 2018 00:47:15 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfwm8uSA0HFqc5INYHSbON0C2JXC7aMxl9OyZoDIrpx2npsbcpos5AeHkngVogNN0RyCMsk X-Received: by 2002:a63:1315:: with SMTP id i21-v6mr14637710pgl.147.1531727235527; Mon, 16 Jul 2018 00:47:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531727235; cv=none; d=google.com; s=arc-20160816; b=HHlhuOt5JJz7wMgxSjeinMco42xhJhMT/fwx69Njp39xm82E+aydKMgNs8rsUXJvpG ElGxKYfLyRr8rlOgV1vg6yHC/agOO8GuYmyekLXD+UZY/yFHqZR9mjxUDleqhzpCc/mg Lyc+Ds+KI6JVf5VHA8uAdRDvFgJMEB9/MmodwBF9f+KbwPfGYzMOOH8yNQTVikw9a2q8 x3iCOYBRAD/J3UWpzrpkrBqN2g8Bu8Z+odMOdMKCR3Emu3YfvbSbNHhKuVRyvYWc7mVh kElOIRulX70APeqCBEWBMOa++YMAzjUEWaoIYG/E8h3RF122tB3qYq5wgRtfnQaOozXJ 2NVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=EfrMLbNnvMo0qSfMHX5jqMrqJJT+SK+LNzSOZ7Fv60M=; b=nTNrvV9AJPKdxE5stJaWfN7OGGy10SFaC5s6rfPenEvVw1zaIX9i6yMgAc9xqINRht d5m6FXk7mHBPxz8sqn2643lOgOyknEvV4wXZDAwJueqzPT1fgY7ih968EH3useQ9eqPZ WTS4TehuPIqGWz+sbnRnTrzDd4bKky29m/g9GV+shYkbx7j3s3BLAHyzp/R2JyiqO1LL 48BvlgAIoGqfwhhACZI1VHTft/AgdfP0zZpyeomwOypSXVb+BqEX3Fbnl7peXsZfXF8s RBW3YzgQMWMDwhpbs/rmVAOpuL9JsUadQaLo7F1Ww94IUCVxbDnIAlxro58J633+YkKx CkNA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a95-v6si30581529pla.401.2018.07.16.00.47.00; Mon, 16 Jul 2018 00:47:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389650AbeGPILh (ORCPT + 99 others); Mon, 16 Jul 2018 04:11:37 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:49972 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389282AbeGPILg (ORCPT ); Mon, 16 Jul 2018 04:11:36 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id A9783CA4; Mon, 16 Jul 2018 07:45:32 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Leon Romanovsky , Jason Gunthorpe Subject: [PATCH 4.4 42/43] RDMA/ucm: Mark UCM interface as BROKEN Date: Mon, 16 Jul 2018 09:36:47 +0200 Message-Id: <20180716073516.503569716@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180716073511.796555857@linuxfoundation.org> References: <20180716073511.796555857@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Leon Romanovsky commit 7a8690ed6f5346f6738971892205e91d39b6b901 upstream. In commit 357d23c811a7 ("Remove the obsolete libibcm library") in rdma-core [1], we removed obsolete library which used the /dev/infiniband/ucmX interface. Following multiple syzkaller reports about non-sanitized user input in the UCMA module, the short audit reveals the same issues in UCM module too. It is better to disable this interface in the kernel, before syzkaller team invests time and energy to harden this unused interface. [1] https://github.com/linux-rdma/rdma-core/pull/279 Signed-off-by: Leon Romanovsky Signed-off-by: Jason Gunthorpe Signed-off-by: Greg Kroah-Hartman --- drivers/infiniband/Kconfig | 12 ++++++++++++ drivers/infiniband/core/Makefile | 4 ++-- 2 files changed, 14 insertions(+), 2 deletions(-) --- a/drivers/infiniband/Kconfig +++ b/drivers/infiniband/Kconfig @@ -33,6 +33,18 @@ config INFINIBAND_USER_ACCESS libibverbs, libibcm and a hardware driver library from . +config INFINIBAND_USER_ACCESS_UCM + bool "Userspace CM (UCM, DEPRECATED)" + depends on BROKEN + depends on INFINIBAND_USER_ACCESS + help + The UCM module has known security flaws, which no one is + interested to fix. The user-space part of this code was + dropped from the upstream a long time ago. + + This option is DEPRECATED and planned to be removed. + + config INFINIBAND_USER_MEM bool depends on INFINIBAND_USER_ACCESS != n --- a/drivers/infiniband/core/Makefile +++ b/drivers/infiniband/core/Makefile @@ -5,8 +5,8 @@ obj-$(CONFIG_INFINIBAND) += ib_core.o i ib_cm.o iw_cm.o ib_addr.o \ $(infiniband-y) obj-$(CONFIG_INFINIBAND_USER_MAD) += ib_umad.o -obj-$(CONFIG_INFINIBAND_USER_ACCESS) += ib_uverbs.o ib_ucm.o \ - $(user_access-y) +obj-$(CONFIG_INFINIBAND_USER_ACCESS) += ib_uverbs.o $(user_access-y) +obj-$(CONFIG_INFINIBAND_USER_ACCESS_UCM) += ib_ucm.o $(user_access-y) ib_core-y := packer.o ud_header.o verbs.o sysfs.o \ device.o fmr_pool.o cache.o netlink.o \