Re: wip-msgr2

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Dec 17, 2020 at 5:45 PM Luis Henriques <lhenriques@xxxxxxx> wrote:
>
> Ilya Dryomov <idryomov@xxxxxxxxx> writes:
> <snip>
> >
> > Ah, I disabled KASAN for some performance testing and didn't turn
> > it back on.  This doesn't actually corrupt any memory because the
> > 96-byte object that gets allocated is big enough.  In fact, the
> > relevant code used to request 96 bytes independent of the connection
> > mode until I changed it to follow the on-wire format more strictly.
> >
> > This frame is 68 bytes in plane mode and 96 bytes in secure mode
> > but we are requesting 68 bytes in both modes.  The following should
> > fix it:
> >
> > diff --git a/net/ceph/messenger_v2.c b/net/ceph/messenger_v2.c
> > index 5e38c847317b..11fd47b36fc8 100644
> > --- a/net/ceph/messenger_v2.c
> > +++ b/net/ceph/messenger_v2.c
> > @@ -1333,7 +1333,8 @@ static int prepare_auth_signature(struct
> > ceph_connection *con)
> >         void *buf;
> >         int ret;
> >
> > -       buf = alloc_conn_buf(con, head_onwire_len(SHA256_DIGEST_SIZE, false));
> > +       buf = alloc_conn_buf(con, head_onwire_len(SHA256_DIGEST_SIZE,
> > +                                                 con_secure(con)));
> >         if (!buf)
> >                 return -ENOMEM;
>
> Looks like this fix didn't made it into your pull-request.  Did it just
> fell through the cracks, or is this fixed somewhere else on the code?

No, it didn't, it's in the testing branch:

  https://github.com/ceph/ceph-client/commit/add7ad675cd1bdaf2751da1af9295fb43896da66

Thanks,

                Ilya



[Index of Archives]     [CEPH Users]     [Ceph Large]     [Ceph Dev]     [Information on CEPH]     [Linux BTRFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux