summaryrefslogtreecommitdiff
path: root/scripts
diff options
context:
space:
mode:
authorJack Morgenstein <jackm@dev.mellanox.co.il>2018-07-11 11:23:52 +0300
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2018-08-06 17:20:51 +0300
commit65be9cbe1224f1fe51591b44e3d35603b81b595c (patch)
treefcf3baf76f306a48b23a2c7afd613bd2bc905f12 /scripts
parent4aa0acf290643c8161a0b6af4b5083a000124ff1 (diff)
downloadlinux-65be9cbe1224f1fe51591b44e3d35603b81b595c.tar.xz
RDMA/uverbs: Expand primary and alt AV port checks
commit addb8a6559f0f8b5a37582b7ca698358445a55bf upstream. The commit cited below checked that the port numbers provided in the primary and alt AVs are legal. That is sufficient to prevent a kernel panic. However, it is not sufficient for correct operation. In Linux, AVs (both primary and alt) must be completely self-described. We do not accept an AV from userspace without an embedded port number. (This has been the case since kernel 3.14 commit dbf727de7440 ("IB/core: Use GID table in AH creation and dmac resolution")). For the primary AV, this embedded port number must match the port number specified with IB_QP_PORT. We also expect the port number embedded in the alt AV to match the alt_port_num value passed by the userspace driver in the modify_qp command base structure. Add these checks to modify_qp. Cc: <stable@vger.kernel.org> # 4.16 Fixes: 5d4c05c3ee36 ("RDMA/uverbs: Sanitize user entered port numbers prior to access it") Signed-off-by: Jack Morgenstein <jackm@dev.mellanox.co.il> Signed-off-by: Leon Romanovsky <leonro@mellanox.com> Signed-off-by: Jason Gunthorpe <jgg@mellanox.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'scripts')
0 files changed, 0 insertions, 0 deletions