Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp326776pxb; Mon, 16 Aug 2021 06:23:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzKhbSrIUZyFNOnTgVLdP8sLfYfPqPhqJ+1uCRLceAzR7Cb9XDSe79fv7PyEWM+AxeEq+6k X-Received: by 2002:a17:906:d1d6:: with SMTP id bs22mr15572008ejb.554.1629120231725; Mon, 16 Aug 2021 06:23:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629120231; cv=none; d=google.com; s=arc-20160816; b=OX/K3W6oQYAOXjiUs6Z4s+MF75hNT447fNIWPXH7CyOqjAK0vUQSJih2r0IMdKAuDJ xL5ZRw8pvl+NAi7hRW3SI0ALZywaxp4DvHmr2i2cNXKc43DaYOOYj9NxWyE4f9+rRP+G bA2ngqW4EtHiQkPkPRnvPdzsXO1fZSaDRcAH5sWeYxz/wgF04QHV+zw5aRn3vVfI/Q5W pOXWP2ggoVnbItqJaI8k18QITJhFdU4UFpNKiQUKqsEwNBWElbmv/JJbIvKXiA/CANjb EvsuNw0UltEDSqz+uCt9Vvgxh/MQXs0oHNNeR5C+ArB3xypzI+119q/0TV6j72xjnK+E l0fA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bH0laJZ8dfjD8V7yYx0uWTeaw8JPRPeU5X6djmErEi0=; b=KENDkjD0yB0wpRvAogj4ScHZ8LFEo5i2QPxEVnhxGThS82AhC3edlMJL+ERW4EFStj 13rOzn4lrmKsQugDiU9wdrIcx5I6kQ0PmTGGM7SSLC9mT0APnC8mQTJsq5VdaBFz0SsA A36qbJBYYkybrYB/AYGcmJlrcWhWvZw1v9ip2XIlgyyBt3f1EEeILsmO6HD13YxG3ez6 srbus5EgNkOaLR8fvue3+Xarcppw06aFu6ZrBaRW+QWiX8Qpk17UpU8oLnp3hRnOAHOQ MU4IUttGV9tNcTKTLYTUi2waBD9+RzHZUt7lm39R4fGWTflX+NTLOaOshOSMteDGlInG XTJQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=cJhn5xh6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n18si2536857eja.711.2021.08.16.06.23.28; Mon, 16 Aug 2021 06:23:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=cJhn5xh6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240626AbhHPNT5 (ORCPT + 99 others); Mon, 16 Aug 2021 09:19:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:37188 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239494AbhHPNLZ (ORCPT ); Mon, 16 Aug 2021 09:11:25 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 4D9F86329B; Mon, 16 Aug 2021 13:10:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1629119408; bh=Y3LrwcJXlunsJKDo9+kyZzdFI3Ja8tF0U6CMl8ERqF4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=cJhn5xh6V1MdHmAzvNHsjW8/l+KibJa/Pfxn+GPloLIzJTnfDRH7QjiCa/OV4yLG+ QRA3vFCbOJCeSai04384cLfClIL5VgLWtPBjn9SlGgIKMscI70MKaRoRXA3cVztdtf geQ7Bj9tlG5z2eqMtSYSl297Ig+lw/bSqbiDob7E= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Shyam Prasad N , Steve French Subject: [PATCH 5.13 015/151] cifs: create sd context must be a multiple of 8 Date: Mon, 16 Aug 2021 15:00:45 +0200 Message-Id: <20210816125444.576975230@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210816125444.082226187@linuxfoundation.org> References: <20210816125444.082226187@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Shyam Prasad N commit 7d3fc01796fc895e5fcce45c994c5a8db8120a8d upstream. We used to follow the rule earlier that the create SD context always be a multiple of 8. However, with the change: cifs: refactor create_sd_buf() and and avoid corrupting the buffer ...we recompute the length, and we failed that rule. Fixing that with this change. Cc: # v5.10+ Signed-off-by: Shyam Prasad N Signed-off-by: Steve French Signed-off-by: Greg Kroah-Hartman --- fs/cifs/smb2pdu.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/fs/cifs/smb2pdu.c +++ b/fs/cifs/smb2pdu.c @@ -2375,7 +2375,7 @@ create_sd_buf(umode_t mode, bool set_own memcpy(aclptr, &acl, sizeof(struct cifs_acl)); buf->ccontext.DataLength = cpu_to_le32(ptr - (__u8 *)&buf->sd); - *len = ptr - (__u8 *)buf; + *len = roundup(ptr - (__u8 *)buf, 8); return buf; }