Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp5223353ybl; Tue, 27 Aug 2019 01:04:26 -0700 (PDT) X-Google-Smtp-Source: APXvYqwXSUVEmLn30o+SP5SWZg/gJrPomejY5pErHGV3PeGIr6QUYyzi0AMjfiQozcmLySDObYfs X-Received: by 2002:a63:d23:: with SMTP id c35mr20068373pgl.376.1566893066677; Tue, 27 Aug 2019 01:04:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566893066; cv=none; d=google.com; s=arc-20160816; b=cZUrwazdJZ6pCMPrcP9MYrfDUBMo0HuFSJcB9RvXtamiqAW13A9V9X176mho9qk89s ieaMoYCtD2cKEcd4NM6C91/RDVzb2ypdfpiW8pxJ98852Im0+7w6o2YUBHddWtnGJ511 7CHQxD8c9IJV23b9dO/rPKMfdBcTYdtisgui/kqcH3aQwKb2ibih4kQ2ojttN/dX7mzK DpEnxmcmw2bRapj5kEjNZ3ElujoR+5lgaT3uHlJY2Um3gCX3x+RHHmRqMRldHUT28T9F 1PUw9NRg2FfHTMBMW2zAafADOA4vm5T2OK3Uj76DoAX3Ixs5+mbHTFVi3P6Lvza4aKvY 60oQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=9rLLKPM+8Z2YlBD8y8qMxRrcGKX9QFcqZ/lC5SB0+1M=; b=cvdTyU323PfQ7HMCYfnqxb71LrWmx+SIZ+yoZ/BSC+CwsXybImHlZIxj/c7OpeEbal 23zl02iqpEH9MehImrKyyKIsrFlE+LrRFXI/tBxHnrYYSDm46okDpVP7kSLuQgd6ovM7 SdJdMxkcqKjVKVdXCNBWWF/VoWPnmXfGPjZEw1MDlAomdBe8tyx8lOngSNu786AZhPfc dq48ubD7PHKix7EMvJRC7ZXylXg4+ANAl0KAlaBd+qSPncwmzQl589gzmUzVgu9OK6Nj LvQq0j7Aw0Pd1k8zSETxunIEJSPRW8Jl/uuvHOHahgrXbENxz1tIYYa1Z1tSm9Szkfln wMfA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RUW4AJmC; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d9si4827524pll.320.2019.08.27.01.04.12; Tue, 27 Aug 2019 01:04:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RUW4AJmC; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731654AbfH0IDC (ORCPT + 99 others); Tue, 27 Aug 2019 04:03:02 -0400 Received: from mail.kernel.org ([198.145.29.99]:60318 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732160AbfH0IDA (ORCPT ); Tue, 27 Aug 2019 04:03:00 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A291C206BA; Tue, 27 Aug 2019 08:02:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1566892980; bh=SZ7LXaA9SMy5Zlfp47yQEpZ46W5F86EzMhFJ3rNeoKc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RUW4AJmCe3TYhYMjwdqyiVjtd2np3j3YKobJfGGnzq18KfEqLOow1H7HkgVIvIiQw bBKPcr7smXaeyKH0fQOxFcIhHYz5fXHdAI0PnG0A/0uH5IYnzpYQnqyymHA39qrHXe /o3xMFNVbsl1Wvw/ZAbgtFN71TPR547f5TEkA7VE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sebastien Tisserant , Pavel Shilovsky , Steve French , Sasha Levin Subject: [PATCH 5.2 081/162] SMB3: Kernel oops mounting a encryptData share with CONFIG_DEBUG_VIRTUAL Date: Tue, 27 Aug 2019 09:50:09 +0200 Message-Id: <20190827072740.934485846@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190827072738.093683223@linuxfoundation.org> References: <20190827072738.093683223@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit ee9d66182392695535cc9fccfcb40c16f72de2a9 ] Fix kernel oops when mounting a encryptData CIFS share with CONFIG_DEBUG_VIRTUAL Signed-off-by: Sebastien Tisserant Reviewed-by: Pavel Shilovsky Signed-off-by: Steve French Signed-off-by: Sasha Levin --- fs/cifs/smb2ops.c | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/fs/cifs/smb2ops.c b/fs/cifs/smb2ops.c index ae10d6e297c3a..42de31d206169 100644 --- a/fs/cifs/smb2ops.c +++ b/fs/cifs/smb2ops.c @@ -3439,7 +3439,15 @@ fill_transform_hdr(struct smb2_transform_hdr *tr_hdr, unsigned int orig_len, static inline void smb2_sg_set_buf(struct scatterlist *sg, const void *buf, unsigned int buflen) { - sg_set_page(sg, virt_to_page(buf), buflen, offset_in_page(buf)); + void *addr; + /* + * VMAP_STACK (at least) puts stack into the vmalloc address space + */ + if (is_vmalloc_addr(buf)) + addr = vmalloc_to_page(buf); + else + addr = virt_to_page(buf); + sg_set_page(sg, addr, buflen, offset_in_page(buf)); } /* Assumes the first rqst has a transform header as the first iov. -- 2.20.1