Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp3505264pxb; Mon, 4 Apr 2022 19:08:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwNzrdOA0L3sCVPzKGHZVpnZrBZM5hEPlSdZkb2vUBIaaA7ReZnlfjYzwlhTeqZhJB8xeRe X-Received: by 2002:a63:7f1c:0:b0:382:1fb5:58b8 with SMTP id a28-20020a637f1c000000b003821fb558b8mr892612pgd.507.1649124496265; Mon, 04 Apr 2022 19:08:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649124496; cv=none; d=google.com; s=arc-20160816; b=GCv2ayErkhwdlMmdMVQJzKqSEqvzx0BGZo5k7KZDyUrzsVptl6jW03yV2qUVJuit93 d3wmAYyk+aj7KySoDFNbVLXmb6s/bIx3Pxq9wqT1DeutUcZsNCkeuYiNQPt7abJ3B1pm lbXWfLCLXRjoxD8uXJ+x0AMHc+uk7YFJCdL4TXWrIILvAn/ebiaN/zoGZSDVEQrylF2j 4ev6Ro9GebpfB4zrldWbKpHOUNYouWXK/kLNzZfkEbO3K3jQfsM5sWBxDol9aG3eHrpq XpnisCNmEj2uVYB6zfx2Gl+heJbU8Sac7giZ1FOxcHeDcFnwhTcNuuNZfMmQFuIvzSaA TL/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=mnkyPW/EtBh9d9SScX7K2xnppl0LFPcflgUezyMxwys=; b=oqswPfHlE1+PxvLPBmAaTnbkXOrsBaS0HRl9qDj+WXjNgns9u4uJ7SnRMPBIqHIq5A NZLMaj3H6/+iYb2GrRxIbvcVU40flEkeUYxXDkqxS7zYtsBbBXs/GLm5HMNGc8L0GrZu gukjAmOGwhmFT3E4xfwZCE9bLajJAuTPgY1HxTV7fXMMAzS/4Of6edGyvMk2c/hUxbDy ynZBegJz1SzgS7HSBiTq9PMGvF7GOxUU6r3t9uYbOsaG+tBsOhxKDcjfQyM1CIxuRKx1 mwi9YrPgHGsCp4JO5dqEyjyHi3ZKXMWyTesLAYDEsbHU3f8onlUKDP7DX2fUS0jGy9WW 1x8Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=asSjYG5v; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id q26-20020a638c5a000000b003816043ee4csi11899152pgn.65.2022.04.04.19.08.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Apr 2022 19:08:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=asSjYG5v; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id E395823932E; Mon, 4 Apr 2022 17:30:48 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1376654AbiDDOyY (ORCPT + 99 others); Mon, 4 Apr 2022 10:54:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54156 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238922AbiDDOyW (ORCPT ); Mon, 4 Apr 2022 10:54:22 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DC49FD77; Mon, 4 Apr 2022 07:52:25 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 91080B815AA; Mon, 4 Apr 2022 14:52:24 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D230AC340EE; Mon, 4 Apr 2022 14:52:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1649083943; bh=u+iokChokqnptOaYdhPCnVKH5AXTQ1F0xqg4my/Zjps=; h=From:To:Cc:Subject:Date:From; b=asSjYG5vOjbN7wxNwnyTrfk7Jlwrpy+dMdF9Gln+3BQ1+32W1r+MzhWJfKaV1eq2h YZ5bhwnpHrOR1tsW428mTsOe7/RU6gLfbfaaFRQGJ4wUYgyibnuoZs4QXZya/lDHfV jX2me6StIQFa1fYl/xP5O77OxN0+jTh9yxc48wSUCr051do5nnUCJk3WwerBtZtZbs 2kpPMOco1Z/jvx9W+zuFmoFt4tObGaid3yrjsNawg0OA+TH5OPZPmVNXX9tBc8NSZj HLmyLlMhg64kOnIddApJddN6/CM1+y4yX10BH0u0PHqRQou79tr1Vs9GujYNEybsT1 ivHeMIP5ffbBA== From: Leon Romanovsky To: Jason Gunthorpe Cc: Mark Zhang , linux-kernel@vger.kernel.org, linux-rdma@vger.kernel.org, syzbot+8fcbb77276d43cc8b693@syzkaller.appspotmail.com Subject: [PATCH rdma-rc] RDMA/cma: Limit join multicast to UD QP type only Date: Mon, 4 Apr 2022 17:52:18 +0300 Message-Id: <4132fdbc9fbba5dca834c84ae383d7fe6a917760.1649083917.git.leonro@nvidia.com> X-Mailer: git-send-email 2.35.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mark Zhang Only UD QP type is allowed to join multicast. This patch also fixes an uninit-value error: the ib->rec.qkey field is accessed without being initialized. This is because multicast join was allowed for all port spaces, even these that omit qkey. ===================================================== BUG: KMSAN: uninit-value in cma_set_qkey drivers/infiniband/core/cma.c:510 [inline] BUG: KMSAN: uninit-value in cma_make_mc_event+0xb73/0xe00 drivers/infiniband/core/cma.c:4570 cma_set_qkey drivers/infiniband/core/cma.c:510 [inline] cma_make_mc_event+0xb73/0xe00 drivers/infiniband/core/cma.c:4570 cma_iboe_join_multicast drivers/infiniband/core/cma.c:4782 [inline] rdma_join_multicast+0x2b83/0x30a0 drivers/infiniband/core/cma.c:4814 ucma_process_join+0xa76/0xf60 drivers/infiniband/core/ucma.c:1479 ucma_join_multicast+0x1e3/0x250 drivers/infiniband/core/ucma.c:1546 ucma_write+0x639/0x6d0 drivers/infiniband/core/ucma.c:1732 vfs_write+0x8ce/0x2030 fs/read_write.c:588 ksys_write+0x28c/0x520 fs/read_write.c:643 __do_sys_write fs/read_write.c:655 [inline] __se_sys_write fs/read_write.c:652 [inline] __ia32_sys_write+0xdb/0x120 fs/read_write.c:652 do_syscall_32_irqs_on arch/x86/entry/common.c:114 [inline] __do_fast_syscall_32+0x96/0xf0 arch/x86/entry/common.c:180 do_fast_syscall_32+0x34/0x70 arch/x86/entry/common.c:205 do_SYSENTER_32+0x1b/0x20 arch/x86/entry/common.c:248 entry_SYSENTER_compat_after_hwframe+0x4d/0x5c Local variable ib.i created at: cma_iboe_join_multicast drivers/infiniband/core/cma.c:4737 [inline] rdma_join_multicast+0x586/0x30a0 drivers/infiniband/core/cma.c:4814 ucma_process_join+0xa76/0xf60 drivers/infiniband/core/ucma.c:1479 CPU: 0 PID: 29874 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ===================================================== Fixes: b5de0c60cc30 ("RDMA/cma: Fix use after free race in roce multicast join") Reported-by: syzbot+8fcbb77276d43cc8b693@syzkaller.appspotmail.com Signed-off-by: Mark Zhang Signed-off-by: Leon Romanovsky --- drivers/infiniband/core/cma.c | 32 ++++++++++++++++++-------------- 1 file changed, 18 insertions(+), 14 deletions(-) diff --git a/drivers/infiniband/core/cma.c b/drivers/infiniband/core/cma.c index fabca5e51e3d..3e315fc0ac16 100644 --- a/drivers/infiniband/core/cma.c +++ b/drivers/infiniband/core/cma.c @@ -496,22 +496,11 @@ static inline unsigned short cma_family(struct rdma_id_private *id_priv) return id_priv->id.route.addr.src_addr.ss_family; } -static int cma_set_qkey(struct rdma_id_private *id_priv, u32 qkey) +static int cma_set_default_qkey(struct rdma_id_private *id_priv) { struct ib_sa_mcmember_rec rec; int ret = 0; - if (id_priv->qkey) { - if (qkey && id_priv->qkey != qkey) - return -EINVAL; - return 0; - } - - if (qkey) { - id_priv->qkey = qkey; - return 0; - } - switch (id_priv->id.ps) { case RDMA_PS_UDP: case RDMA_PS_IB: @@ -528,9 +517,22 @@ static int cma_set_qkey(struct rdma_id_private *id_priv, u32 qkey) default: break; } + return ret; } +static int cma_set_qkey(struct rdma_id_private *id_priv, u32 qkey) +{ + if (!qkey) + return cma_set_default_qkey(id_priv); + + if (id_priv->qkey && (id_priv->qkey != qkey)) + return -EINVAL; + + id_priv->qkey = qkey; + return 0; +} + static void cma_translate_ib(struct sockaddr_ib *sib, struct rdma_dev_addr *dev_addr) { dev_addr->dev_type = ARPHRD_INFINIBAND; @@ -4762,8 +4764,7 @@ static int cma_iboe_join_multicast(struct rdma_id_private *id_priv, cma_iboe_set_mgid(addr, &ib.rec.mgid, gid_type); ib.rec.pkey = cpu_to_be16(0xffff); - if (id_priv->id.ps == RDMA_PS_UDP) - ib.rec.qkey = cpu_to_be32(RDMA_UDP_QKEY); + ib.rec.qkey = cpu_to_be32(RDMA_UDP_QKEY); if (dev_addr->bound_dev_if) ndev = dev_get_by_index(dev_addr->net, dev_addr->bound_dev_if); @@ -4815,6 +4816,9 @@ int rdma_join_multicast(struct rdma_cm_id *id, struct sockaddr *addr, READ_ONCE(id_priv->state) != RDMA_CM_ADDR_RESOLVED)) return -EINVAL; + if (id_priv->id.qp_type != IB_QPT_UD) + return -EINVAL; + mc = kzalloc(sizeof(*mc), GFP_KERNEL); if (!mc) return -ENOMEM; -- 2.35.1