Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp643249ybz; Wed, 22 Apr 2020 05:21:50 -0700 (PDT) X-Google-Smtp-Source: APiQypJzC9brhGz5ryq05jc1XT6931mgASBZAsmGMImbyrMoW3xI9WPP/HPF5Gk+tN2+LZw+oF0g X-Received: by 2002:a50:da49:: with SMTP id a9mr22223297edk.388.1587558110586; Wed, 22 Apr 2020 05:21:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587558110; cv=none; d=google.com; s=arc-20160816; b=HLVUBIjwbFAnlBZoQXF23GBbcMeQtt3XkNSkIqlJGH5J1CIDU8c3MX5+w/wM5CB8AB 8Wto0hj3pkpx7oM7ZnoNZUSxeF1a/3NAtlvaZvoC3qXP8/aSEkvCW0ejZGdXqrWN77lp LXFp1Ul+ur+ZqzYCMXJxjq4/95hfLY08K6cRPVXQOao3vwCRnv2BoJ6ArFyixdEz+rbR xm/e4vrNcqhwfDqGWuxGx4EsmvAUD6VSYgjwYFMLxHrwwqp/ljowNQnu5buDwdJVSJR2 FYpq4gSUq6jSYunVNH5+CS6n5vN77prltrTk/zJVHy+PVzxXXeIm89U96p25MAVLwOa1 dhIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=xwFAKKzYlcR+weyDXZ0Ijvocz6wo10iBypcHuwbtC90=; b=JhEuEFF3regssxlI9RogpKawoJlO+mJKCkJlBOVBFh2omer+5JGf8xQOEZ2jZ0G85R 3xsjjpj11miLBQEDI+QjzsQrDyEd+yLT6+WMifiQj6UMi3umdOAexdhVGpnxgqrndsvx mC388CcdpqIcOUNFoONHYuhm8Otn3lL3vGH2fPV66P72oKSwFyos7TqK8Xz/6/1cZ+YX tiV7OyiSm+B31DZAyiN1VFE7T5p5r4yDlz/0QnQ8oEKH7G27XnTegbjQAmf6f1UPSlBJ ly5hQn9omUF11vuB9h07I6kRP3ja4OPPTrx9YEX+MXMnIkzQ3w22CsFKGqgvT2Wr3eLg HqwA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="o9DW/jLz"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cx2si3278342edb.452.2020.04.22.05.21.27; Wed, 22 Apr 2020 05:21:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="o9DW/jLz"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730488AbgDVKZB (ORCPT + 99 others); Wed, 22 Apr 2020 06:25:01 -0400 Received: from mail.kernel.org ([198.145.29.99]:33212 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730462AbgDVKYr (ORCPT ); Wed, 22 Apr 2020 06:24:47 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2436E2071E; Wed, 22 Apr 2020 10:24:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587551086; bh=SFHvZtCLZ6EPWmNWrCEP+2BJ94BANmVoF5rF+9ZXu9Q=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=o9DW/jLz+jJkWdCYj2OEsYaSI4Pi1B6XVkfK9ttVWPTuYVb97puw64MheZH2jfgi2 hU2eyF8HtG8fD4rzJFP0DWkcjXOD+m0NPSnzmS3gsYiocYp5gU5bZrJ8NLdlD3so3Z LAII7M+rC3z3hYuVrl6bZH9puat81nxXd+gmfA04= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Long Li , Steve French , Sasha Levin Subject: [PATCH 5.6 095/166] cifs: Allocate encryption header through kmalloc Date: Wed, 22 Apr 2020 11:57:02 +0200 Message-Id: <20200422095059.240155317@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200422095047.669225321@linuxfoundation.org> References: <20200422095047.669225321@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Long Li [ Upstream commit 3946d0d04bb360acca72db5efe9ae8440012d9dc ] When encryption is used, smb2_transform_hdr is defined on the stack and is passed to the transport. This doesn't work with RDMA as the buffer needs to be DMA'ed. Fix it by using kmalloc. Signed-off-by: Long Li Signed-off-by: Steve French Signed-off-by: Sasha Levin --- fs/cifs/transport.c | 28 +++++++++++++++++----------- 1 file changed, 17 insertions(+), 11 deletions(-) diff --git a/fs/cifs/transport.c b/fs/cifs/transport.c index cb3ee916f5275..c97570eb2c180 100644 --- a/fs/cifs/transport.c +++ b/fs/cifs/transport.c @@ -466,7 +466,7 @@ smb_send_rqst(struct TCP_Server_Info *server, int num_rqst, struct smb_rqst *rqst, int flags) { struct kvec iov; - struct smb2_transform_hdr tr_hdr; + struct smb2_transform_hdr *tr_hdr; struct smb_rqst cur_rqst[MAX_COMPOUND]; int rc; @@ -476,28 +476,34 @@ smb_send_rqst(struct TCP_Server_Info *server, int num_rqst, if (num_rqst > MAX_COMPOUND - 1) return -ENOMEM; - memset(&cur_rqst[0], 0, sizeof(cur_rqst)); - memset(&iov, 0, sizeof(iov)); - memset(&tr_hdr, 0, sizeof(tr_hdr)); - - iov.iov_base = &tr_hdr; - iov.iov_len = sizeof(tr_hdr); - cur_rqst[0].rq_iov = &iov; - cur_rqst[0].rq_nvec = 1; - if (!server->ops->init_transform_rq) { cifs_server_dbg(VFS, "Encryption requested but transform " "callback is missing\n"); return -EIO; } + tr_hdr = kmalloc(sizeof(*tr_hdr), GFP_NOFS); + if (!tr_hdr) + return -ENOMEM; + + memset(&cur_rqst[0], 0, sizeof(cur_rqst)); + memset(&iov, 0, sizeof(iov)); + memset(tr_hdr, 0, sizeof(*tr_hdr)); + + iov.iov_base = tr_hdr; + iov.iov_len = sizeof(*tr_hdr); + cur_rqst[0].rq_iov = &iov; + cur_rqst[0].rq_nvec = 1; + rc = server->ops->init_transform_rq(server, num_rqst + 1, &cur_rqst[0], rqst); if (rc) - return rc; + goto out; rc = __smb_send_rqst(server, num_rqst + 1, &cur_rqst[0]); smb3_free_compound_rqst(num_rqst, &cur_rqst[1]); +out: + kfree(tr_hdr); return rc; } -- 2.20.1