* [PATCH] IB/core: Avoid crash on pkey enforcement failed in received MADs
@ 2017-10-31 15:33 Parav Pandit
[not found] ` <1509463998-49670-1-git-send-email-parav-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 6+ messages in thread
From: Parav Pandit @ 2017-10-31 15:33 UTC (permalink / raw)
To: linux-rdma-u79uwXL29TY76Z2rM5mHXA
Cc: parav-VPRAkNaXOzVWk0Htik3J/w, danielj-VPRAkNaXOzVWk0Htik3J/w
Below kernel crash is observed when Pkey security enforcement fails on
received MADs. This issue is reported in [1].
ib_free_recv_mad() accesses the rmpp_list, whose initialization is
needed before accessing it.
When security enformcent fails on received MADs, MAD processing avoided
due to security checks failed.
OpenSM[3770]: SM port is down
kernel: BUG: unable to handle kernel NULL pointer dereference at 0000000000000008
kernel: IP: ib_free_recv_mad+0x44/0xa0 [ib_core]
kernel: PGD 0
kernel: P4D 0
kernel:
kernel: Oops: 0002 [#1] SMP
kernel: CPU: 0 PID: 2833 Comm: kworker/0:1H Tainted: P IO 4.13.4-1-pve #1
kernel: Hardware name: Dell XS23-TY3 /9CMP63, BIOS 1.71 09/17/2013
kernel: Workqueue: ib-comp-wq ib_cq_poll_work [ib_core]
kernel: task: ffffa069c6541600 task.stack: ffffb9a729054000
kernel: RIP: 0010:ib_free_recv_mad+0x44/0xa0 [ib_core]
kernel: RSP: 0018:ffffb9a729057d38 EFLAGS: 00010286
kernel: RAX: ffffa069cb138a48 RBX: ffffa069cb138a10 RCX: 0000000000000000
kernel: RDX: ffffb9a729057d38 RSI: 0000000000000000 RDI: ffffa069cb138a20
kernel: RBP: ffffb9a729057d60 R08: ffffa072d2d49800 R09: ffffa069cb138ae0
kernel: R10: ffffa069cb138ae0 R11: ffffa072b3994e00 R12: ffffb9a729057d38
kernel: R13: ffffa069d1c90000 R14: 0000000000000000 R15: ffffa069d1c90880
kernel: FS: 0000000000000000(0000) GS:ffffa069dba00000(0000) knlGS:0000000000000000
kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kernel: CR2: 0000000000000008 CR3: 00000011f51f2000 CR4: 00000000000006f0
kernel: Call Trace:
kernel: ib_mad_recv_done+0x5cc/0xb50 [ib_core]
kernel: __ib_process_cq+0x5c/0xb0 [ib_core]
kernel: ib_cq_poll_work+0x20/0x60 [ib_core]
kernel: process_one_work+0x1e9/0x410
kernel: worker_thread+0x4b/0x410
kernel: kthread+0x109/0x140
kernel: ? process_one_work+0x410/0x410
kernel: ? kthread_create_on_node+0x70/0x70
kernel: ? SyS_exit_group+0x14/0x20
kernel: ret_from_fork+0x25/0x30
kernel: RIP: ib_free_recv_mad+0x44/0xa0 [ib_core] RSP: ffffb9a729057d38
kernel: CR2: 0000000000000008
[1] : https://www.spinics.net/lists/linux-rdma/msg56190.html
Fixes: 47a2b338fe63 ("IB/core: Enforce security on management datagrams")
Signed-off-by: Parav Pandit <parav-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org>
Reported-by: Chris Blake <chrisrblake93-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
Reviewed-by: Daniel Jurgens <danielj-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org>
Reviewed-by: Hal Rosenstock <hal-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org>
---
drivers/infiniband/core/mad.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/drivers/infiniband/core/mad.c b/drivers/infiniband/core/mad.c
index f8f53bb..cb91245 100644
--- a/drivers/infiniband/core/mad.c
+++ b/drivers/infiniband/core/mad.c
@@ -1974,14 +1974,15 @@ static void ib_mad_complete_recv(struct ib_mad_agent_private *mad_agent_priv,
unsigned long flags;
int ret;
+ INIT_LIST_HEAD(&mad_recv_wc->rmpp_list);
ret = ib_mad_enforce_security(mad_agent_priv,
mad_recv_wc->wc->pkey_index);
if (ret) {
ib_free_recv_mad(mad_recv_wc);
deref_mad_agent(mad_agent_priv);
+ return;
}
- INIT_LIST_HEAD(&mad_recv_wc->rmpp_list);
list_add(&mad_recv_wc->recv_buf.list, &mad_recv_wc->rmpp_list);
if (ib_mad_kernel_rmpp_agent(&mad_agent_priv->agent)) {
mad_recv_wc = ib_process_rmpp_recv_wc(mad_agent_priv,
--
1.8.3.1
--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply related [flat|nested] 6+ messages in thread[parent not found: <1509463998-49670-1-git-send-email-parav-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org>]
* RE: [PATCH] IB/core: Avoid crash on pkey enforcement failed in received MADs [not found] ` <1509463998-49670-1-git-send-email-parav-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> @ 2017-11-03 15:46 ` Parav Pandit [not found] ` <VI1PR0502MB3008E61E5EBFA422FAF52674D15D0-o1MPJYiShExKsLr+rGaxW8DSnupUy6xnnBOFsp37pqbUKgpGm//BTAC/G2K4zDHf@public.gmane.org> 0 siblings, 1 reply; 6+ messages in thread From: Parav Pandit @ 2017-11-03 15:46 UTC (permalink / raw) To: Parav Pandit, linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org Cc: Daniel Jurgens Hi Leon/Doug, > -----Original Message----- > From: Parav Pandit [mailto:parav-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org] > Sent: Tuesday, October 31, 2017 10:33 AM > To: linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org > Cc: Parav Pandit <parav-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org>; Daniel Jurgens > <danielj-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> > Subject: [PATCH] IB/core: Avoid crash on pkey enforcement failed in received > MADs > > Below kernel crash is observed when Pkey security enforcement fails on > received MADs. This issue is reported in [1]. > > ib_free_recv_mad() accesses the rmpp_list, whose initialization is needed before > accessing it. > When security enformcent fails on received MADs, MAD processing avoided due > to security checks failed. > > OpenSM[3770]: SM port is down > kernel: BUG: unable to handle kernel NULL pointer dereference at > 0000000000000008 > kernel: IP: ib_free_recv_mad+0x44/0xa0 [ib_core] > kernel: PGD 0 > kernel: P4D 0 > kernel: > kernel: Oops: 0002 [#1] SMP > kernel: CPU: 0 PID: 2833 Comm: kworker/0:1H Tainted: P IO 4.13.4-1-pve > #1 > kernel: Hardware name: Dell XS23-TY3 /9CMP63, BIOS 1.71 09/17/2013 > kernel: Workqueue: ib-comp-wq ib_cq_poll_work [ib_core] > kernel: task: ffffa069c6541600 task.stack: ffffb9a729054000 > kernel: RIP: 0010:ib_free_recv_mad+0x44/0xa0 [ib_core] > kernel: RSP: 0018:ffffb9a729057d38 EFLAGS: 00010286 > kernel: RAX: ffffa069cb138a48 RBX: ffffa069cb138a10 RCX: 0000000000000000 > kernel: RDX: ffffb9a729057d38 RSI: 0000000000000000 RDI: ffffa069cb138a20 > kernel: RBP: ffffb9a729057d60 R08: ffffa072d2d49800 R09: ffffa069cb138ae0 > kernel: R10: ffffa069cb138ae0 R11: ffffa072b3994e00 R12: ffffb9a729057d38 > kernel: R13: ffffa069d1c90000 R14: 0000000000000000 R15: ffffa069d1c90880 > kernel: FS: 0000000000000000(0000) GS:ffffa069dba00000(0000) > knlGS:0000000000000000 > kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > kernel: CR2: 0000000000000008 CR3: 00000011f51f2000 CR4: > 00000000000006f0 > kernel: Call Trace: > kernel: ib_mad_recv_done+0x5cc/0xb50 [ib_core] > kernel: __ib_process_cq+0x5c/0xb0 [ib_core] > kernel: ib_cq_poll_work+0x20/0x60 [ib_core] > kernel: process_one_work+0x1e9/0x410 > kernel: worker_thread+0x4b/0x410 > kernel: kthread+0x109/0x140 > kernel: ? process_one_work+0x410/0x410 > kernel: ? kthread_create_on_node+0x70/0x70 > kernel: ? SyS_exit_group+0x14/0x20 > kernel: ret_from_fork+0x25/0x30 > kernel: RIP: ib_free_recv_mad+0x44/0xa0 [ib_core] RSP: ffffb9a729057d38 > kernel: CR2: 0000000000000008 > > [1] : https://www.spinics.net/lists/linux-rdma/msg56190.html > > Fixes: 47a2b338fe63 ("IB/core: Enforce security on management datagrams") > Signed-off-by: Parav Pandit <parav-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> > Reported-by: Chris Blake <chrisrblake93-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> > Reviewed-by: Daniel Jurgens <danielj-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> > Reviewed-by: Hal Rosenstock <hal-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> > --- I think this is needed for 4.13+. I missed to CC stable in this patch. Shall I resend with Cc: or? -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 6+ messages in thread
[parent not found: <VI1PR0502MB3008E61E5EBFA422FAF52674D15D0-o1MPJYiShExKsLr+rGaxW8DSnupUy6xnnBOFsp37pqbUKgpGm//BTAC/G2K4zDHf@public.gmane.org>]
* Re: [PATCH] IB/core: Avoid crash on pkey enforcement failed in received MADs [not found] ` <VI1PR0502MB3008E61E5EBFA422FAF52674D15D0-o1MPJYiShExKsLr+rGaxW8DSnupUy6xnnBOFsp37pqbUKgpGm//BTAC/G2K4zDHf@public.gmane.org> @ 2017-11-03 20:21 ` Leon Romanovsky [not found] ` <20171103202136.GJ16127-U/DQcQFIOTAAJjI8aNfphQ@public.gmane.org> 0 siblings, 1 reply; 6+ messages in thread From: Leon Romanovsky @ 2017-11-03 20:21 UTC (permalink / raw) To: Parav Pandit Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, Daniel Jurgens [-- Attachment #1: Type: text/plain, Size: 3699 bytes --] On Fri, Nov 03, 2017 at 03:46:40PM +0000, Parav Pandit wrote: > Hi Leon/Doug, > > > -----Original Message----- > > From: Parav Pandit [mailto:parav-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org] > > Sent: Tuesday, October 31, 2017 10:33 AM > > To: linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org > > Cc: Parav Pandit <parav-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org>; Daniel Jurgens > > <danielj-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> > > Subject: [PATCH] IB/core: Avoid crash on pkey enforcement failed in received > > MADs > > > > Below kernel crash is observed when Pkey security enforcement fails on > > received MADs. This issue is reported in [1]. > > > > ib_free_recv_mad() accesses the rmpp_list, whose initialization is needed before > > accessing it. > > When security enformcent fails on received MADs, MAD processing avoided due > > to security checks failed. > > > > OpenSM[3770]: SM port is down > > kernel: BUG: unable to handle kernel NULL pointer dereference at > > 0000000000000008 > > kernel: IP: ib_free_recv_mad+0x44/0xa0 [ib_core] > > kernel: PGD 0 > > kernel: P4D 0 > > kernel: > > kernel: Oops: 0002 [#1] SMP > > kernel: CPU: 0 PID: 2833 Comm: kworker/0:1H Tainted: P IO 4.13.4-1-pve > > #1 > > kernel: Hardware name: Dell XS23-TY3 /9CMP63, BIOS 1.71 09/17/2013 > > kernel: Workqueue: ib-comp-wq ib_cq_poll_work [ib_core] > > kernel: task: ffffa069c6541600 task.stack: ffffb9a729054000 > > kernel: RIP: 0010:ib_free_recv_mad+0x44/0xa0 [ib_core] > > kernel: RSP: 0018:ffffb9a729057d38 EFLAGS: 00010286 > > kernel: RAX: ffffa069cb138a48 RBX: ffffa069cb138a10 RCX: 0000000000000000 > > kernel: RDX: ffffb9a729057d38 RSI: 0000000000000000 RDI: ffffa069cb138a20 > > kernel: RBP: ffffb9a729057d60 R08: ffffa072d2d49800 R09: ffffa069cb138ae0 > > kernel: R10: ffffa069cb138ae0 R11: ffffa072b3994e00 R12: ffffb9a729057d38 > > kernel: R13: ffffa069d1c90000 R14: 0000000000000000 R15: ffffa069d1c90880 > > kernel: FS: 0000000000000000(0000) GS:ffffa069dba00000(0000) > > knlGS:0000000000000000 > > kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > > kernel: CR2: 0000000000000008 CR3: 00000011f51f2000 CR4: > > 00000000000006f0 > > kernel: Call Trace: > > kernel: ib_mad_recv_done+0x5cc/0xb50 [ib_core] > > kernel: __ib_process_cq+0x5c/0xb0 [ib_core] > > kernel: ib_cq_poll_work+0x20/0x60 [ib_core] > > kernel: process_one_work+0x1e9/0x410 > > kernel: worker_thread+0x4b/0x410 > > kernel: kthread+0x109/0x140 > > kernel: ? process_one_work+0x410/0x410 > > kernel: ? kthread_create_on_node+0x70/0x70 > > kernel: ? SyS_exit_group+0x14/0x20 > > kernel: ret_from_fork+0x25/0x30 > > kernel: RIP: ib_free_recv_mad+0x44/0xa0 [ib_core] RSP: ffffb9a729057d38 > > kernel: CR2: 0000000000000008 > > > > [1] : https://www.spinics.net/lists/linux-rdma/msg56190.html > > > > Fixes: 47a2b338fe63 ("IB/core: Enforce security on management datagrams") > > Signed-off-by: Parav Pandit <parav-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> > > Reported-by: Chris Blake <chrisrblake93-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> > > Reviewed-by: Daniel Jurgens <danielj-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> > > Reviewed-by: Hal Rosenstock <hal-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> > > --- > > I think this is needed for 4.13+. I missed to CC stable in this patch. > Shall I resend with Cc: or? I believe that Doug will add it. By the way, did you find the root cause of why security check failed and we entered into that path? Thanks > -- > To unsubscribe from this list: send the line "unsubscribe linux-rdma" in > the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org > More majordomo info at http://vger.kernel.org/majordomo-info.html [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 6+ messages in thread
[parent not found: <20171103202136.GJ16127-U/DQcQFIOTAAJjI8aNfphQ@public.gmane.org>]
* RE: [PATCH] IB/core: Avoid crash on pkey enforcement failed in received MADs [not found] ` <20171103202136.GJ16127-U/DQcQFIOTAAJjI8aNfphQ@public.gmane.org> @ 2017-11-06 17:12 ` Parav Pandit [not found] ` <VI1PR0502MB300832C02DA8288A6CD55BCDD1500-o1MPJYiShExKsLr+rGaxW8DSnupUy6xnnBOFsp37pqbUKgpGm//BTAC/G2K4zDHf@public.gmane.org> 2017-11-10 18:26 ` Doug Ledford 1 sibling, 1 reply; 6+ messages in thread From: Parav Pandit @ 2017-11-06 17:12 UTC (permalink / raw) To: Leon Romanovsky Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, Daniel Jurgens > -----Original Message----- > From: Leon Romanovsky [mailto:leon-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org] > Sent: Friday, November 03, 2017 3:22 PM > To: Parav Pandit <parav-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> > Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org; Daniel Jurgens <danielj-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> > Subject: Re: [PATCH] IB/core: Avoid crash on pkey enforcement failed in > received MADs > > > > Fixes: 47a2b338fe63 ("IB/core: Enforce security on management > > > datagrams") > > > Signed-off-by: Parav Pandit <parav-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> > > > Reported-by: Chris Blake <chrisrblake93-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> > > > Reviewed-by: Daniel Jurgens <danielj-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> > > > Reviewed-by: Hal Rosenstock <hal-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> > > > --- > > > > I think this is needed for 4.13+. I missed to CC stable in this patch. > > Shall I resend with Cc: or? > > I believe that Doug will add it. > Ok. Thanks. > By the way, did you find the root cause of why security check failed and we > entered into that path? > I believe Dan replied in the other thread. -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 6+ messages in thread
[parent not found: <VI1PR0502MB300832C02DA8288A6CD55BCDD1500-o1MPJYiShExKsLr+rGaxW8DSnupUy6xnnBOFsp37pqbUKgpGm//BTAC/G2K4zDHf@public.gmane.org>]
* Re: [PATCH] IB/core: Avoid crash on pkey enforcement failed in received MADs [not found] ` <VI1PR0502MB300832C02DA8288A6CD55BCDD1500-o1MPJYiShExKsLr+rGaxW8DSnupUy6xnnBOFsp37pqbUKgpGm//BTAC/G2K4zDHf@public.gmane.org> @ 2017-11-06 17:13 ` Daniel Jurgens 0 siblings, 0 replies; 6+ messages in thread From: Daniel Jurgens @ 2017-11-06 17:13 UTC (permalink / raw) To: Parav Pandit, Leon Romanovsky Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org On 11/6/2017 11:12 AM, Parav Pandit wrote: > >> -----Original Message----- >> From: Leon Romanovsky [mailto:leon-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org] >> Sent: Friday, November 03, 2017 3:22 PM >> To: Parav Pandit <parav-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> >> Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org; Daniel Jurgens <danielj-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> >> Subject: Re: [PATCH] IB/core: Avoid crash on pkey enforcement failed in >> received MADs >> >>>> Fixes: 47a2b338fe63 ("IB/core: Enforce security on management >>>> datagrams") >>>> Signed-off-by: Parav Pandit <parav-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> >>>> Reported-by: Chris Blake <chrisrblake93-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> >>>> Reviewed-by: Daniel Jurgens <danielj-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> >>>> Reviewed-by: Hal Rosenstock <hal-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> >>>> --- >>> I think this is needed for 4.13+. I missed to CC stable in this patch. >>> Shall I resend with Cc: or? >> I believe that Doug will add it. >> > Ok. Thanks. > >> By the way, did you find the root cause of why security check failed and we >> entered into that path? >> > I believe Dan replied in the other thread. > I've been unable to reproduce the denial that caused entry into that path. -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH] IB/core: Avoid crash on pkey enforcement failed in received MADs [not found] ` <20171103202136.GJ16127-U/DQcQFIOTAAJjI8aNfphQ@public.gmane.org> 2017-11-06 17:12 ` Parav Pandit @ 2017-11-10 18:26 ` Doug Ledford 1 sibling, 0 replies; 6+ messages in thread From: Doug Ledford @ 2017-11-10 18:26 UTC (permalink / raw) To: Leon Romanovsky, Parav Pandit Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, Daniel Jurgens [-- Attachment #1: Type: text/plain, Size: 847 bytes --] On Fri, 2017-11-03 at 22:21 +0200, Leon Romanovsky wrote: > > > Fixes: 47a2b338fe63 ("IB/core: Enforce security on management datagrams") > > > Signed-off-by: Parav Pandit <parav-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> > > > Reported-by: Chris Blake <chrisrblake93-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> > > > Reviewed-by: Daniel Jurgens <danielj-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> > > > Reviewed-by: Hal Rosenstock <hal-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org> > > > --- > > > > I think this is needed for 4.13+. I missed to CC stable in this patch. > > Shall I resend with Cc: or? > > I believe that Doug will add it. I did. Applied, thanks. -- Doug Ledford <dledford-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> GPG KeyID: B826A3330E572FDD Key fingerprint = AE6B 1BDA 122B 23B4 265B 1274 B826 A333 0E57 2FDD [-- Attachment #2: This is a digitally signed message part --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2017-11-10 18:26 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-10-31 15:33 [PATCH] IB/core: Avoid crash on pkey enforcement failed in received MADs Parav Pandit
[not found] ` <1509463998-49670-1-git-send-email-parav-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org>
2017-11-03 15:46 ` Parav Pandit
[not found] ` <VI1PR0502MB3008E61E5EBFA422FAF52674D15D0-o1MPJYiShExKsLr+rGaxW8DSnupUy6xnnBOFsp37pqbUKgpGm//BTAC/G2K4zDHf@public.gmane.org>
2017-11-03 20:21 ` Leon Romanovsky
[not found] ` <20171103202136.GJ16127-U/DQcQFIOTAAJjI8aNfphQ@public.gmane.org>
2017-11-06 17:12 ` Parav Pandit
[not found] ` <VI1PR0502MB300832C02DA8288A6CD55BCDD1500-o1MPJYiShExKsLr+rGaxW8DSnupUy6xnnBOFsp37pqbUKgpGm//BTAC/G2K4zDHf@public.gmane.org>
2017-11-06 17:13 ` Daniel Jurgens
2017-11-10 18:26 ` Doug Ledford
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox