Kamal Heib activity https://gitlab.com/kheib 2026-03-17T14:18:37Z tag:gitlab.com,2026-03-17:5212820387 Kamal Heib closed merge request !2231: RDMA: Include fixes for both RDMA and mlx5 at Red Hat / centos-stream / src / kernel / centos-stream-10 2026-03-17T13:11:30Z kheib Kamal Heib [email protected]

JIRA: https://issues.redhat.com/browse/VOYAGER-266

JIRA: https://issues.redhat.com/browse/VOYAGER-267

This MR include multiple bug fixes for both the RDMA subsystem and the mlx5 drivers.

Signed-off-by: Kamal Heib [email protected]

tag:gitlab.com,2026-03-17:5212819888 Kamal Heib commented on merge request !2231 at Red Hat / centos-stream / src / kernel / centos-stream-10 2026-03-17T13:11:25Z kheib Kamal Heib [email protected]

Yes, I agree, closing this MR.

tag:gitlab.com,2026-03-10:5187603011 Kamal Heib commented on merge request !2231 at Red Hat / centos-stream / src / kernel / centos-stream-10 2026-03-10T13:29:12Z kheib Kamal Heib [email protected]

Fixed

tag:gitlab.com,2026-03-09:5181926388 Kamal Heib opened merge request !2231: RDMA: Include fixes for both RDMA and mlx5 at Red Hat / centos-stream / src / kernel / centos-stream-10 2026-03-09T11:01:03Z kheib Kamal Heib [email protected]

JIRA: https://issues.redhat.com/browse/VOYAGER-266

JIRA: https://issues.redhat.com/browse/VOYAGER-267

This MR include multiple bug fixes for both the RDMA subsystem and the mlx5 drivers.

Signed-off-by: Kamal Heib [email protected]

tag:gitlab.com,2026-03-09:5180358741 Kamal Heib pushed new project branch rdma-rc at Kamal Heib / centos-stream-10 2026-03-09T02:26:42Z kheib Kamal Heib [email protected]

Kamal Heib (d43c48eb) at 09 Mar 02:26

net/mlx5e: Fix "scheduling while atomic" in IPsec MAC address query

... and 35138 more commits

tag:gitlab.com,2026-03-05:5170693249 Kamal Heib pushed to project branch rdma-next at Kamal Heib / centos-stream-10 2026-03-05T12:28:39Z kheib Kamal Heib [email protected]

Kamal Heib (8b08dc13) at 05 Mar 12:28

RDMA/uverbs: Import DMA-BUF module in uverbs_std_types_dmabuf file

... and 17 more commits

tag:gitlab.com,2026-03-05:5168649867 Kamal Heib pushed to project branch rdma-next at Kamal Heib / centos-stream-10 2026-03-05T01:05:36Z kheib Kamal Heib [email protected]

Kamal Heib (ce5eab21) at 05 Mar 01:05

types: move phys_vec definition to common header

tag:gitlab.com,2026-03-04:5167878554 Kamal Heib pushed new project branch rdma-next at Kamal Heib / centos-stream-10 2026-03-04T19:47:16Z kheib Kamal Heib [email protected]

Kamal Heib (e3412df0) at 04 Mar 19:47

RDMA/mlx5: Implement DMABUF export ops

... and 35145 more commits

tag:gitlab.com,2026-03-02:5156934039 Kamal Heib closed merge request !7886: rtnetlink: Allocate vfinfo size for VF GUIDs when supported at Red Hat / centos-stream / src / kernel / centos-stream-9 2026-03-02T10:45:59Z kheib Kamal Heib [email protected]

JIRA: https://issues.redhat.com/browse/RHEL-145522

CVE: CVE-2025-22075

commit 23f00807619d15063d676218f36c5dfeda1eb420 Author: Mark Zhang [email protected] Date: Tue Mar 25 11:02:26 2025 +0200

rtnetlink: Allocate vfinfo size for VF GUIDs when supported

Commit 30aad41721e0 ("net/core: Add support for getting VF GUIDs")
added support for getting VF port and node GUIDs in netlink ifinfo
messages, but their size was not taken into consideration in the
function that allocates the netlink message, causing the following
warning when a netlink message is filled with many VF port and node
GUIDs:
 RTNETLINK answers: Message too long
 Cannot send link get request: Message too long

Kernel warning:

 ------------[ cut here ]------------
 WARNING: CPU: 2 PID: 1930 at net/core/rtnetlink.c:4151 rtnl_getlink+0x586/0x5a0
 Modules linked in: xt_conntrack xt_MASQUERADE nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter overlay mlx5_ib macsec mlx5_core tls rpcrdma rdma_ucm ib_uverbs ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm iw_cm ib_ipoib fuse ib_cm ib_core
 CPU: 2 UID: 0 PID: 1930 Comm: ip Not tainted 6.14.0-rc2+ #1
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 RIP: 0010:rtnl_getlink+0x586/0x5a0
 Code: cb 82 e8 3d af 0a 00 4d 85 ff 0f 84 08 ff ff ff 4c 89 ff 41 be ea ff ff ff e8 66 63 5b ff 49 c7 07 80 4f cb 82 e9 36 fc ff ff <0f> 0b e9 16 fe ff ff e8 de a0 56 00 66 66 2e 0f 1f 84 00 00 00 00
 RSP: 0018:ffff888113557348 EFLAGS: 00010246
 RAX: 00000000ffffffa6 RBX: ffff88817e87aa34 RCX: dffffc0000000000
 RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffff88817e87afb8
 RBP: 0000000000000009 R08: ffffffff821f44aa R09: 0000000000000000
 R10: ffff8881260f79a8 R11: ffff88817e87af00 R12: ffff88817e87aa00
 R13: ffffffff8563d300 R14: 00000000ffffffa6 R15: 00000000ffffffff
 FS:  00007f63a5dbf280(0000) GS:ffff88881ee00000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007f63a5ba4493 CR3: 00000001700fe002 CR4: 0000000000772eb0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
  <TASK>
  ? __warn+0xa5/0x230
  ? rtnl_getlink+0x586/0x5a0
  ? report_bug+0x22d/0x240
  ? handle_bug+0x53/0xa0
  ? exc_invalid_op+0x14/0x50
  ? asm_exc_invalid_op+0x16/0x20
  ? skb_trim+0x6a/0x80
  ? rtnl_getlink+0x586/0x5a0
  ? __pfx_rtnl_getlink+0x10/0x10
  ? rtnetlink_rcv_msg+0x1e5/0x860
  ? __pfx___mutex_lock+0x10/0x10
  ? rcu_is_watching+0x34/0x60
  ? __pfx_lock_acquire+0x10/0x10
  ? stack_trace_save+0x90/0xd0
  ? filter_irq_stacks+0x1d/0x70
  ? kasan_save_stack+0x30/0x40
  ? kasan_save_stack+0x20/0x40
  ? kasan_save_track+0x10/0x30
  rtnetlink_rcv_msg+0x21c/0x860
  ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
  ? __pfx_rtnetlink_rcv_msg+0x10/0x10
  ? arch_stack_walk+0x9e/0xf0
  ? rcu_is_watching+0x34/0x60
  ? lock_acquire+0xd5/0x410
  ? rcu_is_watching+0x34/0x60
  netlink_rcv_skb+0xe0/0x210
  ? __pfx_rtnetlink_rcv_msg+0x10/0x10
  ? __pfx_netlink_rcv_skb+0x10/0x10
  ? rcu_is_watching+0x34/0x60
  ? __pfx___netlink_lookup+0x10/0x10
  ? lock_release+0x62/0x200
  ? netlink_deliver_tap+0xfd/0x290
  ? rcu_is_watching+0x34/0x60
  ? lock_release+0x62/0x200
  ? netlink_deliver_tap+0x95/0x290
  netlink_unicast+0x31f/0x480
  ? __pfx_netlink_unicast+0x10/0x10
  ? rcu_is_watching+0x34/0x60
  ? lock_acquire+0xd5/0x410
  netlink_sendmsg+0x369/0x660
  ? lock_release+0x62/0x200
  ? __pfx_netlink_sendmsg+0x10/0x10
  ? import_ubuf+0xb9/0xf0
  ? __import_iovec+0x254/0x2b0
  ? lock_release+0x62/0x200
  ? __pfx_netlink_sendmsg+0x10/0x10
  ____sys_sendmsg+0x559/0x5a0
  ? __pfx_____sys_sendmsg+0x10/0x10
  ? __pfx_copy_msghdr_from_user+0x10/0x10
  ? rcu_is_watching+0x34/0x60
  ? do_read_fault+0x213/0x4a0
  ? rcu_is_watching+0x34/0x60
  ___sys_sendmsg+0xe4/0x150
  ? __pfx____sys_sendmsg+0x10/0x10
  ? do_fault+0x2cc/0x6f0
  ? handle_pte_fault+0x2e3/0x3d0
  ? __pfx_handle_pte_fault+0x10/0x10
  ? preempt_count_sub+0x14/0xc0
  ? __down_read_trylock+0x150/0x270
  ? __handle_mm_fault+0x404/0x8e0
  ? __pfx___handle_mm_fault+0x10/0x10
  ? lock_release+0x62/0x200
  ? __rcu_read_unlock+0x65/0x90
  ? rcu_is_watching+0x34/0x60
  __sys_sendmsg+0xd5/0x150
  ? __pfx___sys_sendmsg+0x10/0x10
  ? __up_read+0x192/0x480
  ? lock_release+0x62/0x200
  ? __rcu_read_unlock+0x65/0x90
  ? rcu_is_watching+0x34/0x60
  do_syscall_64+0x6d/0x140
  entry_SYSCALL_64_after_hwframe+0x76/0x7e
 RIP: 0033:0x7f63a5b13367
 Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
 RSP: 002b:00007fff8c726bc8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
 RAX: ffffffffffffffda RBX: 0000000067b687c2 RCX: 00007f63a5b13367
 RDX: 0000000000000000 RSI: 00007fff8c726c30 RDI: 0000000000000004
 RBP: 00007fff8c726cb8 R08: 0000000000000000 R09: 0000000000000034
 R10: 00007fff8c726c7c R11: 0000000000000246 R12: 0000000000000001
 R13: 0000000000000000 R14: 00007fff8c726cd0 R15: 00007fff8c726cd0
  </TASK>
 irq event stamp: 0
 hardirqs last  enabled at (0): [<0000000000000000>] 0x0
 hardirqs last disabled at (0): [<ffffffff813f9e58>] copy_process+0xd08/0x2830
 softirqs last  enabled at (0): [<ffffffff813f9e58>] copy_process+0xd08/0x2830
 softirqs last disabled at (0): [<0000000000000000>] 0x0
 ---[ end trace 0000000000000000 ]---

Thus, when calculating ifinfo message size, take VF GUIDs sizes into
account when supported.

Fixes: 30aad41721e0 ("net/core: Add support for getting VF GUIDs")
Signed-off-by: Mark Zhang <[email protected]>
Reviewed-by: Maher Sanalla <[email protected]>
Signed-off-by: Mark Bloch <[email protected]>
Reviewed-by: Sabrina Dubroca <[email protected]>
Link: https://patch.msgid.link/[email protected]
Signed-off-by: Jakub Kicinski <[email protected]>

Signed-off-by: Kamal Heib [email protected]

tag:gitlab.com,2026-02-24:5138161396 Kamal Heib pushed new project branch 9.8-octeontx2-126837v4 at Kamal Heib / centos-stream-9 2026-02-24T17:23:59Z kheib Kamal Heib [email protected]

Kamal Heib (816c26a7) at 24 Feb 17:23

octeontx2-pf: Fix aura BPID assignment when CONFIG_DCB is enabled

... and 154852 more commits