diff options
author | Jeff Layton <jlayton@redhat.com> | 2012-12-03 06:05:30 -0500 |
---|---|---|
committer | Steve French <smfrench@gmail.com> | 2012-12-08 22:04:32 -0600 |
commit | 2ae03025d520de581fd1c58e98bbf3045c0f4695 (patch) | |
tree | 4795149c42b5ecdddd4540dd97c0972522183ea5 /Documentation/kmemleak.txt | |
parent | 41a9f1f6b38664fc08431674d87871a57d763be1 (diff) | |
download | blackbird-op-linux-2ae03025d520de581fd1c58e98bbf3045c0f4695.tar.gz blackbird-op-linux-2ae03025d520de581fd1c58e98bbf3045c0f4695.zip |
cifs: extra sanity checking for cifs.idmap keys
Now that we aren't so rigid about the length of the key being passed
in, we need to be a bit more rigorous about checking the length of
the actual data against the claimed length (a'la num_subauths field).
Check for the case where userspace sends us a seemingly valid key
with a num_subauths field that goes beyond the end of the array. If
that happens, return -EIO and invalidate the key.
Also change the other places where we check for malformed keys in this
code to invalidate the key as well.
Reviewed-by: Shirish Pargaonkar <shirishpargaonkar@gmail.com>
Signed-off-by: Jeff Layton <jlayton@redhat.com>
Signed-off-by: Steve French <smfrench@gmail.com>
Diffstat (limited to 'Documentation/kmemleak.txt')
0 files changed, 0 insertions, 0 deletions