lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 15 Jan 2014 20:42:11 -0500 From: "Martin K. Petersen" <martin.petersen@...cle.com> To: "Nicholas A. Bellinger" <nab@...ux-iscsi.org> Cc: sagi grimberg <sagig@...lanox.com>, "Nicholas A. Bellinger" <nab@...erainc.com>, target-devel <target-devel@...r.kernel.org>, linux-scsi <linux-scsi@...r.kernel.org>, linux-kernel <linux-kernel@...r.kernel.org>, "Martin K. Petersen" <martin.petersen@...cle.com>, Christoph Hellwig <hch@....de>, Hannes Reinecke <hare@...e.de>, Or Gerlitz <ogerlitz@...lanox.com> Subject: Re: [PATCH 00/14] target: Initial support for DIF Type1+Type3 emulation >>>>> "nab" == Nicholas A Bellinger <nab@...ux-iscsi.org> writes: nab> The issue is that existing fs/bio-integrity.c code always assumes nab> client/initiator mode, in that it will attempt to nab> bio_integrity_generate() protection information in the submit_bio nab> WRITE path, and bio_integrity_verify() of protection information in nab> the bio_endio READ completion path. Only if the submit_bio() caller hasn't attached protection information already. If you submit a bio with a bip already attached the block layer will not generate/verify. -- Martin K. Petersen Oracle Linux Engineering -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists