lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200822101250.GA16935@ogabbay-VM>
Date:   Sat, 22 Aug 2020 13:12:50 +0300
From:   Oded Gabbay <oded.gabbay@...il.com>
To:     gregkh@...uxfoundation.org
Cc:     linux-kernel@...r.kernel.org
Subject: [git pull] habanalabs fixes pull request for kernel 5.9-rc2/3

Hello Greg,

This is the pull request for habanalabs driver fixes for 5.9-rc2/3.
Mostly security fixes but also some functionality fixes. More details are
in the tag.

Thanks,
Oded

The following changes since commit 51072c0f5b5e98a035c6f63b83ba2afedbb7accd:

  mei: hdcp: fix mei_hdcp_verify_mprime() input parameter (2020-08-18 15:39:38 +0200)

are available in the Git repository at:

  git://people.freedesktop.org/~gabbayo/linux tags/misc-habanalabs-fixes-2020-08-22

for you to fetch changes up to 5aba368893c0d9e275f4b823e053fd16155f63b9:

  habanalabs: correctly report inbound pci region cfg error (2020-08-22 12:47:58 +0300)

----------------------------------------------------------------
This tag contains the following bug fixes for 5.9-rc2/3:

- Correct cleanup of PCI bar mapping in case of failure during
  initialization.

- Several security fixes:
  - Validating user addresses before mapping them
  - Validating packet id (from user) before using it as index for array.
  - Validating F/W file size before coping it.
  - Prevent possible overflow when validating address from user in
    profiler.
  - Validate queue index (from user) before using it as index for array.
  - Check for correct vmalloc return code

- Fix memory corruption in debugfs entry

- Fix a loop in gaudi_extract_ecc_info()

- Fix the set clock gating function in gaudi code

- Set maximum power to F/W according to the card type

- Cix incorrect check on failed workqueue create

- Correctly report error when configuring the PCI controller

----------------------------------------------------------------
Colin Ian King (1):
      habanalabs: fix incorrect check on failed workqueue create

Dan Carpenter (2):
      habanalabs: Fix memory corruption in debugfs
      habanalabs: Fix a loop in gaudi_extract_ecc_info()

Oded Gabbay (1):
      habanalabs: set max power according to card type

Ofir Bitton (9):
      habanalabs: unmap PCI bars upon iATU failure
      habanalabs: Validate user address before mapping
      habanalabs: validate packet id during CB parse
      habanalabs: verify user input in cs_ioctl_signal_wait
      habanalabs: set clock gating according to mask
      habanalabs: proper handling of alloc size in coresight
      habanalabs: validate FW file size
      habanalabs: check correct vmalloc return code
      habanalabs: correctly report inbound pci region cfg error

 drivers/misc/habanalabs/common/command_buffer.c    | 16 +++-
 .../misc/habanalabs/common/command_submission.c    |  8 ++
 drivers/misc/habanalabs/common/debugfs.c           |  8 +-
 drivers/misc/habanalabs/common/device.c            |  9 ++-
 drivers/misc/habanalabs/common/firmware_if.c       |  9 +++
 drivers/misc/habanalabs/common/habanalabs.h        |  7 +-
 drivers/misc/habanalabs/common/memory.c            |  9 ++-
 drivers/misc/habanalabs/common/mmu.c               |  2 +-
 drivers/misc/habanalabs/common/pci.c               |  8 +-
 drivers/misc/habanalabs/common/sysfs.c             |  7 +-
 drivers/misc/habanalabs/gaudi/gaudi.c              | 92 ++++++++++++++++------
 drivers/misc/habanalabs/gaudi/gaudiP.h             |  3 +-
 drivers/misc/habanalabs/gaudi/gaudi_coresight.c    |  8 +-
 drivers/misc/habanalabs/goya/goya.c                | 31 ++++++++
 drivers/misc/habanalabs/goya/goya_coresight.c      |  8 +-
 15 files changed, 178 insertions(+), 47 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ