There is a new release of libibmad.
Tarball available in:
http://www.openfabrics.org/downloads/management/
(listed in http://www.openfabrics.org/downloads/management/latest.txt)
md5sum:
2df6e87a707801b05c51d0c25872d69b libibmad-1.3.10.tar.gz
All component versions are from recent
There is a new release of infiniband-diags.
Tarball available in:
http://www.openfabrics.org/downloads/management/
(listed in http://www.openfabrics.org/downloads/management/latest.txt)
md5sum:
0df49878f90c52ab7a997ca55e57ef51 infiniband-diags-1.6.2.tar.gz
All component versions are from
Set errno to EINVAL instead of an undefined value if max_retries = 0.
This patch avoids that the following compiler warning is triggered:
src/rpc.c:187:8: warning: 'status' may be used uninitialized in this function
[-Wmaybe-uninitialized]
Signed-off-by: Bart Van Assche bvanass...@acm.org
---
This patch avoids that the following compiler warning is triggered:
src/saquery.c:869:18: warning: variable 'p_ni' set but not used
[-Wunused-but-set-variable]
Signed-off-by: Bart Van Assche bvanass...@acm.org
---
src/saquery.c |2 --
1 file changed, 2 deletions(-)
diff --git
On 8/16/2013 06:11 PM, Sean Hefty wrote:
@@ -884,6 +884,13 @@ int main(int argc, char *argv[])
if (ctx.use_event)
ibv_ack_cq_events(ctx.recv_cq, num_cq_events);
+ /* Process should wait before closing its resources to make sure
+ * latest daemon's response
Source buffers are not modified, let them be 'const'.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link: http://mid.gmane.org/cover.1376847403.git.ydrone...@opteya.com
---
include/rdma/ib_verbs.h | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/include/rdma/ib_verbs.h
Hi,
Please find a few patches against branch for-next of
git://git.kernel.org/pub/scm/linux/kernel/git/roland/infiniband.git,
current head 3e7645800a89f2adccb8d635d36f2fb648048141.
This is a collection of patches to add more checks on userspace provided
input parameters to cm, cma and verbs
When output buffer is too small, others infiniband functions returns
ENOSPC.
This patch changes ib_ucm_event() to returns ENOSPC just like others
functions.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link: http://mid.gmane.org/cover.1376847403.git.ydrone...@opteya.com
---
This patch makes ib_copy_from_udata() check the input length
before reading from userspace buffer to prevent out of bound access.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link: http://mid.gmane.org/cover.1376847403.git.ydrone...@opteya.com
---
include/rdma/ib_verbs.h | 3 +++
1 file
Userspace input buffer is not modified by kernel, let it be 'const'.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link: http://mid.gmane.org/cover.1376847403.git.ydrone...@opteya.com
---
drivers/infiniband/core/uverbs_cmd.c | 2 +-
include/rdma/ib_verbs.h | 2 +-
2 files
Makes ucma_migrate_id() check the length of the output buffer:
this will prevent the function from writing past userspace provided buffer.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link: http://mid.gmane.org/cover.1376847403.git.ydrone...@opteya.com
---
drivers/infiniband/core/ucma.c | 3
Like uverbs, check the length parameter before the command type.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link: http://mid.gmane.org/cover.1376847403.git.ydrone...@opteya.com
---
drivers/infiniband/core/ucma.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git
Makes ib_uverbs_poll_cq() check the length of the output buffer:
this will prevent the function from writing past userspace provided buffer.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link: http://mid.gmane.org/cover.1376847403.git.ydrone...@opteya.com
---
When using INIT_UDATA() with an output buffer set to NULL,
there's no space available, so output buffer length should be set to 0.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link: http://mid.gmane.org/cover.1376847403.git.ydrone...@opteya.com
---
drivers/infiniband/core/uverbs_cmd.c | 4
This patch makes ib_copy_to_udata() check the output length
before writing to userspace buffer to prevent out of bound access.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link: http://mid.gmane.org/cover.1376847403.git.ydrone...@opteya.com
---
include/rdma/ib_verbs.h | 3 +++
1 file
Like uverbs, strictly check the length parameter:
this prevent ucm from processing truncated buffer.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link: http://mid.gmane.org/cover.1376847403.git.ydrone...@opteya.com
---
drivers/infiniband/core/ucm.c | 2 +-
1 file changed, 1 insertion(+), 1
Like uverbs, strictly check the length parameter:
this prevent ucma from processing truncated buffer.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link: http://mid.gmane.org/cover.1376847403.git.ydrone...@opteya.com
---
drivers/infiniband/core/ucma.c | 2 +-
1 file changed, 1 insertion(+),
Makes ucma_query_path() check the length of the output buffer:
this will prevent the function from writing past userspace provided buffer.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link: http://mid.gmane.org/cover.1376847403.git.ydrone...@opteya.com
---
drivers/infiniband/core/ucma.c | 3
ib_icm_path_get() is a function that read data from userspace buffer.
This patch makes 'src' argument to be an explicit pointer
to userspace buffer, so that static analysis won't get fooled
by 'src' being currently an integer without annotation.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Makes uverbs functions check the length of the output buffer:
this will prevent uverbs from writing past userspace provided buffer.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link: http://mid.gmane.org/cover.1376847403.git.ydrone...@opteya.com
---
drivers/infiniband/core/uverbs_cmd.c | 27
Makes ucm functions check the length of the input buffer
before reading the command content: this will detect
truncated command and will prevent ucm from reading past
userspace provided buffer.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link:
Makes verbs functions check the length of the input buffer
before reading the command content: this will detect
truncated command and will prevent uverbs from reading past
userspace provided buffer.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link:
There's no reason to use a signed type for userspace buffer length.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link: http://mid.gmane.org/cover.1376847403.git.ydrone...@opteya.com
---
drivers/infiniband/core/ucm.c | 45 ++-
1 file changed, 23
There's no reason to use a signed type for userspace buffer length.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link: http://mid.gmane.org/cover.1376847403.git.ydrone...@opteya.com
---
drivers/infiniband/core/ucma.c | 55 +-
1 file changed, 28
Makes ucma functions check the length of the input buffer
before reading the command content: this will detect
truncated command and will prevent ucma from reading past
userspace provided buffer.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link:
ib_icm_alloc_data() is a function to allocate a buffer to
copy a userspace provided buffer.
This patch makes 'src' argument to be an explicit pointer
to userspace buffer, so that static analysis won't get fooled
by 'src' being currently an integer without annotation.
Signed-off-by: Yann Droneaud
There's no reason to use a signed type for userspace buffer length.
Signed-off-by: Yann Droneaud ydrone...@opteya.com
Link: http://mid.gmane.org/cover.1376847403.git.ydrone...@opteya.com
---
drivers/infiniband/core/uverbs.h | 4 +-
drivers/infiniband/core/uverbs_cmd.c | 120
27 matches
Mail list logo