Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2970532imu; Sun, 9 Dec 2018 13:58:36 -0800 (PST) X-Google-Smtp-Source: AFSGD/W8ZtyjckwzJXjucLATY08N5eRcgrzHkZxddwMgYc9oePW/J6g9JmL+epBQUdRNP7c2WcgG X-Received: by 2002:a17:902:48:: with SMTP id 66mr9594566pla.68.1544392715915; Sun, 09 Dec 2018 13:58:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544392715; cv=none; d=google.com; s=arc-20160816; b=fpwocR/Vp547qd/xLS29hMQWH47A8BCts1nwthBoZE0BkmSvIhmbXyLSOEc/irXARu eW/B32Rdr1/deBcqfHovdd7OKeK1BmJFv9SdEA3v40+wNnes2Egv3pBF+qzhlvt72ycj 474L1d3AC9jgZs397ioEe6dQMa58AxTUOKkO25HAgwErnhl9YiGnfr/HwqL5ZtGANDyI BJ3tigm9M5nvKfOSi46+WCLERQQqDS1FTA71tpwBQ8jJbaFZH3WqCdGPPd52SnueKBpv v8eAZx96Z0J0POfB4KPc3Tu5oEJ8MpaakAmoSppILxKgL3TRfNPNxFLGgU6utBc9BGZv hZNw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:subject:message-id:date:cc:to :from:mime-version:content-transfer-encoding:content-disposition; bh=fwyELOF7Efk/WxzlQ7O25n616hF4w2tNDgcnIzORvFE=; b=XBExN1PdhNp2ePUMojzymSBEwFXE0QU1Dq0fKtuCow5Mt2oz9wfTZhu2ptUV7GoIaj z6yC9KFF25HFF3iGRgTJMJsR9P86KwPVYABJfAMQo2lqhDSpZSnABSJg3vMZdcmC3zde eO/DZ+wxMgpZK77onFIZznNTWZ8ysE895uaP8LGvf7GqTBB+ANJMLFxBdVpZ1ZhdKuCo DuJ7f6s6vAonC+331ZGdDHLHgV4wiou7PdKk6zLrygUuK9T2ikTp5HOzeljQqEVDfOFe rGJ65QeIPvq/8lxppQiaQeqADKfWZzKM4xZ9YAQ7S1PA4u8Dm9/Xykc/LP9y1eElubJ/ vCRQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j10si8167728pll.179.2018.12.09.13.58.20; Sun, 09 Dec 2018 13:58:35 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726996AbeLIV5D (ORCPT + 99 others); Sun, 9 Dec 2018 16:57:03 -0500 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126]:36462 "EHLO shadbolt.e.decadent.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726823AbeLIVzo (ORCPT ); Sun, 9 Dec 2018 16:55:44 -0500 Received: from pub.yeoldevic.com ([81.174.156.145] helo=deadeye) by shadbolt.decadent.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1gW738-0002po-6G; Sun, 09 Dec 2018 21:55:42 +0000 Received: from ben by deadeye with local (Exim 4.91) (envelope-from ) id 1gW72f-0003Te-Mf; Sun, 09 Dec 2018 21:55:13 +0000 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit MIME-Version: 1.0 From: Ben Hutchings To: linux-kernel@vger.kernel.org, stable@vger.kernel.org CC: akpm@linux-foundation.org, "Jason Gunthorpe" , "Jann Horn" Date: Sun, 09 Dec 2018 21:50:33 +0000 Message-ID: X-Mailer: LinuxStableQueue (scripts by bwh) X-Patchwork-Hint: ignore Subject: [PATCH 3.16 191/328] RDMA/ucma: check fd type in ucma_migrate_id() In-Reply-To: X-SA-Exim-Connect-IP: 81.174.156.145 X-SA-Exim-Mail-From: ben@decadent.org.uk X-SA-Exim-Scanned: No (on shadbolt.decadent.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.16.62-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: Jann Horn commit 0d23ba6034b9cf48b8918404367506da3e4b3ee5 upstream. The current code grabs the private_data of whatever file descriptor userspace has supplied and implicitly casts it to a `struct ucma_file *`, potentially causing a type confusion. This is probably fine in practice because the pointer is only used for comparisons, it is never actually dereferenced; and even in the comparisons, it is unlikely that a file from another filesystem would have a ->private_data pointer that happens to also be valid in this context. But ->private_data is not always guaranteed to be a valid pointer to an object owned by the file's filesystem; for example, some filesystems just cram numbers in there. Check the type of the supplied file descriptor to be safe, analogous to how other places in the kernel do it. Fixes: 88314e4dda1e ("RDMA/cma: add support for rdma_migrate_id()") Signed-off-by: Jann Horn Signed-off-by: Jason Gunthorpe Signed-off-by: Ben Hutchings --- drivers/infiniband/core/ucma.c | 6 ++++++ 1 file changed, 6 insertions(+) --- a/drivers/infiniband/core/ucma.c +++ b/drivers/infiniband/core/ucma.c @@ -113,6 +113,8 @@ static DEFINE_MUTEX(mut); static DEFINE_IDR(ctx_idr); static DEFINE_IDR(multicast_idr); +static const struct file_operations ucma_fops; + static inline struct ucma_context *_ucma_find_context(int id, struct ucma_file *file) { @@ -1448,6 +1450,10 @@ static ssize_t ucma_migrate_id(struct uc f = fdget(cmd.fd); if (!f.file) return -ENOENT; + if (f.file->f_op != &ucma_fops) { + ret = -EINVAL; + goto file_put; + } /* Validate current fd and prevent destruction of id. */ ctx = ucma_get_ctx(f.file->private_data, cmd.id);