[PATCH 0/0] fix smb3-encryption breakage when CONFIG_DEBUG_SG=y

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Steve, All,

I think smb3-encryption has been broken for quite a while (forver?)
when we configure the kernel with CONFIG_DEBUG_SG="y".

The problem is that with these extra checks, we can no longer pass a pointer
to a buffer that is allocated off the stack safely to sg_set_buf() as this
function will BUG_ON.

We have a lot of places where cifs.ko does indeed pass a pointer to a
stack object to this function :-(  and this patch will fix all the instances
I could find so far.


As I think we have been broken in this regard for a long time, and since
this patch is pretty big and non-trivial, I can't say if we should push this
big patch right now or wait for the next merge window.
At the end of the day, it does not seem that anyone has noticed that
CONFIG_DEBUG_SG + smb3-encryption == crash  so maybe no one is actually
hurt by the presence of this bug.


This is the first version I just got to work as far as I can tell.
Please, careful review please. And also ideas if there are other places
we end up using a stack pointer that I missed.
 

--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux