[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20220107011519.GA3028671@nvidia.com>
Date: Thu, 6 Jan 2022 21:15:19 -0400
From: Jason Gunthorpe <jgg@...dia.com>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: linux-rdma@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [GIT PULL] Please pull RDMA subsystem changes
Hi Linus,
Last PR for 5.16, the reversion has been known for a while now but
didn't get a proper fix in time. Looks like we will have several
info-leak bugs to take care of going foward.
Thanks,
Jason
The following changes since commit c9e6606c7fe92b50a02ce51dda82586ebdf99b48:
Linux 5.16-rc8 (2022-01-02 14:23:25 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/rdma/rdma.git tags/for-linus
for you to fetch changes up to b35a0f4dd544eaa6162b6d2f13a2557a121ae5fd:
RDMA/core: Don't infoleak GRH fields (2022-01-05 16:30:19 -0400)
----------------------------------------------------------------
RDMA v5.16 fourth rc pull request
- Revert the patch fixing the DM related crash causing a widespread
regression for kernel ULPs. A proper fix just didn't appear this cycle
due to the holidays
- Missing NULL check on alloc in uverbs
- Double free in rxe error paths
- Fix a new kernel-infoleak report when forming ah_attr's without GRH's in
ucma
----------------------------------------------------------------
Jiasheng Jiang (1):
RDMA/uverbs: Check for null return of kmalloc_array
Leon Romanovsky (1):
RDMA/core: Don't infoleak GRH fields
Li Zhijian (1):
RDMA/rxe: Prevent double freeing rxe_map_set()
Maor Gottlieb (1):
Revert "RDMA/mlx5: Fix releasing unallocated memory in dereg MR flow"
drivers/infiniband/core/uverbs_marshall.c | 2 +-
drivers/infiniband/core/uverbs_uapi.c | 3 +++
drivers/infiniband/hw/mlx5/mlx5_ib.h | 6 +++---
drivers/infiniband/hw/mlx5/mr.c | 26 ++++++++++++++------------
drivers/infiniband/sw/rxe/rxe_mr.c | 16 +++++++---------
5 files changed, 28 insertions(+), 25 deletions(-)
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists