On Tue, Feb 19, 2019 at 02:36:27PM -0500, Scott Mayhew wrote:
(cherry picked from commit e7afe6c1d486b516ed586dcc10b3e7e3e85a9c2b)
While trying to reproduce a reported kernel panic on arm64, I discovered that AUTH_GSS basically doesn't work at all with older enctypes on arm64 systems with CONFIG_VMAP_STACK enabled. It turns out there still a few places using stack memory with scatterlists, causing krb5_encrypt() and krb5_decrypt() to produce incorrect results (or a BUG if CONFIG_DEBUG_SG is enabled).
Tested with cthon on v4.0/v4.1/v4.2 with krb5/krb5i/krb5p using des3-cbc-sha1 and arcfour-hmac-md5.
Signed-off-by: Scott Mayhew smayhew@redhat.com Cc: stable@vger.kernel.org Signed-off-by: J. Bruce Fields bfields@redhat.com
Conflicts: net/sunrpc/auth_gss/gss_krb5_seqnum.c
These two lines are not needed :)
Anyway, thanks for the backport, now queued up for both trees.
greg k-h