lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20210930010235.GA1888324@nvidia.com>
Date:   Wed, 29 Sep 2021 22:02:35 -0300
From:   Jason Gunthorpe <jgg@...dia.com>
To:     Linus Torvalds <torvalds@...ux-foundation.org>,
        Doug Ledford <dledford@...hat.com>
Cc:     linux-rdma@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [GIT PULL] Please pull RDMA subsystem changes

Hi Linus,

Not much too exciting here, although two syzkaller bugs that seem to
have 9 lives may have finally been squashed.

Thanks,
Jason

The following changes since commit 6880fa6c56601bb8ed59df6c30fd390cc5f6dd8f:

  Linux 5.15-rc1 (2021-09-12 16:28:37 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/rdma/rdma.git tags/for-linus

for you to fetch changes up to e671f0ecfece14940a9bb81981098910ea278cf7:

  RDMA/hns: Add the check of the CQE size of the user space (2021-09-27 14:49:49 -0300)

----------------------------------------------------------------
RDMA v5.15 first rc pull request

Several core bugs and a batch of driver bug fixes:

- Fix compilation problems in qib and hfi1

- Do not corrupt the joined multicast group state when using SEND_ONLY

- Several CMA bugs, a reference leak for listening and two syzkaller
  crashers

- Various bug fixes for irdma

- Fix a Sleeping while atomic bug in usnic

- Properly sanitize kernel pointers in dmesg

- Two bugs in the 64b CQE support for hns

----------------------------------------------------------------
Christoph Lameter (1):
      IB/cma: Do not send IGMP leaves for sendonly Multicast groups

Guo Zhi (1):
      RDMA/hfi1: Fix kernel pointer leak

Jason Gunthorpe (4):
      IB/qib: Fix clang confusion of NULL pointer comparison
      RDMA/cma: Do not change route.addr.src_addr.ss_family
      RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests
      RDMA/hns: Work around broken constant propagation in gcc 8

Leon Romanovsky (1):
      RDMA/usnic: Lock VF with mutex instead of spinlock

Selvin Xavier (1):
      MAINTAINERS: Update Broadcom RDMA maintainers

Sindhu Devale (4):
      RDMA/irdma: Skip CQP ring during a reset
      RDMA/irdma: Validate number of CQ entries on create CQ
      RDMA/irdma: Report correct WC error when transport retry counter is exceeded
      RDMA/irdma: Report correct WC error when there are MW bind errors

Tao Liu (1):
      RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure

Wenpeng Liang (2):
      RDMA/hns: Fix the size setting error when copying CQE in clean_cq()
      RDMA/hns: Add the check of the CQE size of the user space

 MAINTAINERS                                  |  1 -
 drivers/infiniband/core/cma.c                | 51 ++++++++++++++++++++++++----
 drivers/infiniband/core/cma_priv.h           |  1 +
 drivers/infiniband/hw/hfi1/ipoib_tx.c        |  8 ++---
 drivers/infiniband/hw/hns/hns_roce_cq.c      | 31 ++++++++++++-----
 drivers/infiniband/hw/hns/hns_roce_hw_v2.c   | 13 +++----
 drivers/infiniband/hw/irdma/cm.c             |  4 +--
 drivers/infiniband/hw/irdma/hw.c             | 14 ++++++--
 drivers/infiniband/hw/irdma/i40iw_if.c       |  2 +-
 drivers/infiniband/hw/irdma/main.h           |  1 -
 drivers/infiniband/hw/irdma/user.h           |  2 ++
 drivers/infiniband/hw/irdma/utils.c          |  2 +-
 drivers/infiniband/hw/irdma/verbs.c          |  9 +++--
 drivers/infiniband/hw/qib/qib_sysfs.c        |  2 +-
 drivers/infiniband/hw/usnic/usnic_ib.h       |  2 +-
 drivers/infiniband/hw/usnic/usnic_ib_main.c  |  2 +-
 drivers/infiniband/hw/usnic/usnic_ib_verbs.c | 16 ++++-----
 17 files changed, 113 insertions(+), 48 deletions(-)

Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ