diff options
| author | Ilya Dryomov <[email protected]> | 2020-12-15 15:49:07 +0000 |
|---|---|---|
| committer | Ilya Dryomov <[email protected]> | 2020-12-28 19:34:33 +0000 |
| commit | f5f2c9a0e3073debc6bc0ecc855ced0158526ee8 (patch) | |
| tree | c3228cfecbf0c0b16ed3ab86bef2cd4a66177f0e /scripts/gcc-plugins/structleak_plugin.c | |
| parent | libceph: fix auth_signature buffer allocation in secure mode (diff) | |
| download | kernel-f5f2c9a0e3073debc6bc0ecc855ced0158526ee8.tar.gz kernel-f5f2c9a0e3073debc6bc0ecc855ced0158526ee8.zip | |
libceph: align session_key and con_secret to 16 bytes
crypto_shash_setkey() and crypto_aead_setkey() will do a (small)
GFP_ATOMIC allocation to align the key if it isn't suitably aligned.
It's not a big deal, but at the same time easy to avoid.
The actual alignment requirement is dynamic, queryable with
crypto_shash_alignmask() and crypto_aead_alignmask(), but shouldn't
be stricter than 16 bytes for our algorithms.
Fixes: cd1a677cad99 ("libceph, ceph: implement msgr2.1 protocol (crc and secure modes)")
Signed-off-by: Ilya Dryomov <[email protected]>
Diffstat (limited to 'scripts/gcc-plugins/structleak_plugin.c')
0 files changed, 0 insertions, 0 deletions
