lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1578506740-22188-6-git-send-email-yishaih@mellanox.com>
Date:   Wed,  8 Jan 2020 20:05:35 +0200
From:   Yishai Hadas <yishaih@...lanox.com>
To:     linux-rdma@...r.kernel.org, jgg@...lanox.com, dledford@...hat.com
Cc:     saeedm@...lanox.com, yishaih@...lanox.com, maorg@...lanox.com,
        michaelgur@...lanox.com, netdev@...r.kernel.org
Subject: [PATCH rdma-next 05/10] RDMA/uverbs: Verify MR access flags

From: Michael Guralnik <michaelgur@...lanox.com>

Verify that MR access flags that are passed from user are all supported
ones, otherwise an error is returned.

Fixes: 4fca03778351 ("IB/uverbs: Move ib_access_flags and ib_read_coun..")
Signed-off-by: Michael Guralnik <michaelgur@...lanox.com>
Signed-off-by: Yishai Hadas <yishaih@...lanox.com>
---
 include/rdma/ib_verbs.h | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/include/rdma/ib_verbs.h b/include/rdma/ib_verbs.h
index 08cc7dc..a104e1c 100644
--- a/include/rdma/ib_verbs.h
+++ b/include/rdma/ib_verbs.h
@@ -4305,6 +4305,9 @@ static inline int ib_check_mr_access(int flags)
 	    !(flags & IB_ACCESS_LOCAL_WRITE))
 		return -EINVAL;
 
+	if (flags & ~IB_ACCESS_SUPPORTED)
+		return -EINVAL;
+
 	return 0;
 }
 
-- 
1.8.3.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ