Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp644782ybz; Wed, 22 Apr 2020 05:23:30 -0700 (PDT) X-Google-Smtp-Source: APiQypJxt/cNcHSGzspXxXpTsGtyJAKmNbH+haQux48Ry9FOQ9eRAsKZNZ4lVxgIYNPq8uBTFC3Q X-Received: by 2002:a05:6402:1694:: with SMTP id a20mr10838918edv.322.1587558210573; Wed, 22 Apr 2020 05:23:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587558210; cv=none; d=google.com; s=arc-20160816; b=YaYle94grFf6lVyiuSsPAa5cFEpm2Jf1jLi8brhyYKnRACxdWeZlk1lmaGzqSxBo1X Ma7cyKTrHL3aiYGhfPBkPg3OW9H99P8aTePDimGU1svnsElYJw9mTBeK7Yk8N0lua45G sf5LwpGYj/avi5m6WsHdHRPC36NQfWmn9BRvr/R9056/+b8wHR4UXblWodcUaekquZZ5 ftlMsH5GdACgrC80mIgVhVru7tq3Qyefap43x1VGJg1XSWuvCE9W6TfDPiqOa6M6CGHW tKosTy7S2MQCHZcALxfynYg3Yrj1TIQmJIWfxkAv4lQ7vEFCGHt+yWvA+2Bxt7DiPC6Y b69w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=cqxap0BV0YYgqu0EPK4DKAuI2bkAUt+zJIK7ggXPBCM=; b=m1LIdLfgBdl4OdXM8Ff8eJBVKd1K8k+qkmljSMIG/vIlsF3rgbJJdNqSmt7sEXu354 ydKjndvtLH73Rk/aZbh/SB5uUaChCwFwJxjgpk9yJvJyPX52M/LrYVrphyyMYSWU/Wmz ugXbGN+gc/6TAupM0BTakZ5kf5l64OS2zUgxKPhz5bEFl4I+SAMdiDtkbRcHB74RCt1+ K5I9T6NS+H7VoKPRIeZgPvfGUZ7nMS8KV4L+mo6HUaieUSdMXSgmxJEZiRdVUJ5CNMIN 6B5Ck96HmHOtk8NAbXMgitGrLWNoCcZ3iPI4qiIY8LEtOdLl8keLmEQu28m6GkXeRzao x7mg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MOcTITFx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x14si3384908ede.22.2020.04.22.05.23.07; Wed, 22 Apr 2020 05:23:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MOcTITFx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732038AbgDVKsM (ORCPT + 99 others); Wed, 22 Apr 2020 06:48:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:49756 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729597AbgDVKOw (ORCPT ); Wed, 22 Apr 2020 06:14:52 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AF04B20575; Wed, 22 Apr 2020 10:14:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587550492; bh=k8xYy+LMBvtR9vGrgEP7ljRQZTei9c9KafyXYKHGOAA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=MOcTITFxwuO986jwqY+hFLlUsPvtQbhXuEXyWeierS5l4fNC+zlQuIzjUI3HINsrZ 8HEVkZGSGS9BLvqXZCUlfYytQh04MiCrmloWnZo/l69f0q2Plrsv0ZxUdxuBr3KBKY 6E5+L72u9YRR8FmNHtwB8M8Pyi7N7nQGoWPao2M4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Long Li , Steve French , Sasha Levin Subject: [PATCH 4.19 38/64] cifs: Allocate encryption header through kmalloc Date: Wed, 22 Apr 2020 11:57:22 +0200 Message-Id: <20200422095019.806639632@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200422095008.799686511@linuxfoundation.org> References: <20200422095008.799686511@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Long Li [ Upstream commit 3946d0d04bb360acca72db5efe9ae8440012d9dc ] When encryption is used, smb2_transform_hdr is defined on the stack and is passed to the transport. This doesn't work with RDMA as the buffer needs to be DMA'ed. Fix it by using kmalloc. Signed-off-by: Long Li Signed-off-by: Steve French Signed-off-by: Sasha Levin --- fs/cifs/transport.c | 28 +++++++++++++++++----------- 1 file changed, 17 insertions(+), 11 deletions(-) diff --git a/fs/cifs/transport.c b/fs/cifs/transport.c index 0c4df56c825ab..70412944b267d 100644 --- a/fs/cifs/transport.c +++ b/fs/cifs/transport.c @@ -392,7 +392,7 @@ smb_send_rqst(struct TCP_Server_Info *server, int num_rqst, struct smb_rqst *rqst, int flags) { struct kvec iov; - struct smb2_transform_hdr tr_hdr; + struct smb2_transform_hdr *tr_hdr; struct smb_rqst cur_rqst[MAX_COMPOUND]; int rc; @@ -402,28 +402,34 @@ smb_send_rqst(struct TCP_Server_Info *server, int num_rqst, if (num_rqst > MAX_COMPOUND - 1) return -ENOMEM; - memset(&cur_rqst[0], 0, sizeof(cur_rqst)); - memset(&iov, 0, sizeof(iov)); - memset(&tr_hdr, 0, sizeof(tr_hdr)); - - iov.iov_base = &tr_hdr; - iov.iov_len = sizeof(tr_hdr); - cur_rqst[0].rq_iov = &iov; - cur_rqst[0].rq_nvec = 1; - if (!server->ops->init_transform_rq) { cifs_dbg(VFS, "Encryption requested but transform callback " "is missing\n"); return -EIO; } + tr_hdr = kmalloc(sizeof(*tr_hdr), GFP_NOFS); + if (!tr_hdr) + return -ENOMEM; + + memset(&cur_rqst[0], 0, sizeof(cur_rqst)); + memset(&iov, 0, sizeof(iov)); + memset(tr_hdr, 0, sizeof(*tr_hdr)); + + iov.iov_base = tr_hdr; + iov.iov_len = sizeof(*tr_hdr); + cur_rqst[0].rq_iov = &iov; + cur_rqst[0].rq_nvec = 1; + rc = server->ops->init_transform_rq(server, num_rqst + 1, &cur_rqst[0], rqst); if (rc) - return rc; + goto out; rc = __smb_send_rqst(server, num_rqst + 1, &cur_rqst[0]); smb3_free_compound_rqst(num_rqst, &cur_rqst[1]); +out: + kfree(tr_hdr); return rc; } -- 2.20.1