aboutsummaryrefslogtreecommitdiffstats
path: root/drivers/target
diff options
context:
space:
mode:
authorAkinobu Mita <akinobu.mita@gmail.com>2015-04-13 10:21:56 -0400
committerNicholas Bellinger <nab@linux-iscsi.org>2015-04-16 01:47:23 -0400
commit38da0f49e8aa1649af397d53f88e163d0e60c058 (patch)
treef1167920d1805849409cc9d71805b12c6cb560ea /drivers/target
parentdc0fafdab88b98581728a574885d0e4d9c6d0640 (diff)
target/file: Fix BUG() when CONFIG_DEBUG_SG=y and DIF protection enabled
When CONFIG_DEBUG_SG=y and DIF protection support enabled, kernel BUG()s are triggered due to the following two issues: 1) prot_sg is not initialized by sg_init_table(). When CONFIG_DEBUG_SG=y, scatterlist helpers check sg entry has a correct magic value. 2) vmalloc'ed buffer is passed to sg_set_buf(). sg_set_buf() uses virt_to_page() to convert virtual address to struct page, but it doesn't work with vmalloc address. vmalloc_to_page() should be used instead. As prot_buf isn't usually too large, so fix it by allocating prot_buf by kmalloc instead of vmalloc. Signed-off-by: Akinobu Mita <akinobu.mita@gmail.com> Cc: Sagi Grimberg <sagig@mellanox.com> Cc: "Martin K. Petersen" <martin.petersen@oracle.com> Cc: Christoph Hellwig <hch@lst.de> Cc: "James E.J. Bottomley" <James.Bottomley@HansenPartnership.com> Cc: <stable@vger.kernel.org> # v3.14+ Signed-off-by: Nicholas Bellinger <nab@linux-iscsi.org>
Diffstat (limited to 'drivers/target')
-rw-r--r--drivers/target/target_core_file.c15
1 files changed, 8 insertions, 7 deletions
diff --git a/drivers/target/target_core_file.c b/drivers/target/target_core_file.c
index fa54835f398b..3dcfc73528ec 100644
--- a/drivers/target/target_core_file.c
+++ b/drivers/target/target_core_file.c
@@ -274,7 +274,7 @@ static int fd_do_prot_rw(struct se_cmd *cmd, struct fd_prot *fd_prot,
274 se_dev->prot_length; 274 se_dev->prot_length;
275 275
276 if (!is_write) { 276 if (!is_write) {
277 fd_prot->prot_buf = vzalloc(prot_size); 277 fd_prot->prot_buf = kzalloc(prot_size, GFP_KERNEL);
278 if (!fd_prot->prot_buf) { 278 if (!fd_prot->prot_buf) {
279 pr_err("Unable to allocate fd_prot->prot_buf\n"); 279 pr_err("Unable to allocate fd_prot->prot_buf\n");
280 return -ENOMEM; 280 return -ENOMEM;
@@ -286,9 +286,10 @@ static int fd_do_prot_rw(struct se_cmd *cmd, struct fd_prot *fd_prot,
286 fd_prot->prot_sg_nents, GFP_KERNEL); 286 fd_prot->prot_sg_nents, GFP_KERNEL);
287 if (!fd_prot->prot_sg) { 287 if (!fd_prot->prot_sg) {
288 pr_err("Unable to allocate fd_prot->prot_sg\n"); 288 pr_err("Unable to allocate fd_prot->prot_sg\n");
289 vfree(fd_prot->prot_buf); 289 kfree(fd_prot->prot_buf);
290 return -ENOMEM; 290 return -ENOMEM;
291 } 291 }
292 sg_init_table(fd_prot->prot_sg, fd_prot->prot_sg_nents);
292 size = prot_size; 293 size = prot_size;
293 294
294 for_each_sg(fd_prot->prot_sg, sg, fd_prot->prot_sg_nents, i) { 295 for_each_sg(fd_prot->prot_sg, sg, fd_prot->prot_sg_nents, i) {
@@ -318,7 +319,7 @@ static int fd_do_prot_rw(struct se_cmd *cmd, struct fd_prot *fd_prot,
318 319
319 if (is_write || ret < 0) { 320 if (is_write || ret < 0) {
320 kfree(fd_prot->prot_sg); 321 kfree(fd_prot->prot_sg);
321 vfree(fd_prot->prot_buf); 322 kfree(fd_prot->prot_buf);
322 } 323 }
323 324
324 return ret; 325 return ret;
@@ -599,11 +600,11 @@ fd_execute_rw(struct se_cmd *cmd, struct scatterlist *sgl, u32 sgl_nents,
599 0, fd_prot.prot_sg, 0); 600 0, fd_prot.prot_sg, 0);
600 if (rc) { 601 if (rc) {
601 kfree(fd_prot.prot_sg); 602 kfree(fd_prot.prot_sg);
602 vfree(fd_prot.prot_buf); 603 kfree(fd_prot.prot_buf);
603 return rc; 604 return rc;
604 } 605 }
605 kfree(fd_prot.prot_sg); 606 kfree(fd_prot.prot_sg);
606 vfree(fd_prot.prot_buf); 607 kfree(fd_prot.prot_buf);
607 } 608 }
608 } else { 609 } else {
609 memset(&fd_prot, 0, sizeof(struct fd_prot)); 610 memset(&fd_prot, 0, sizeof(struct fd_prot));
@@ -619,7 +620,7 @@ fd_execute_rw(struct se_cmd *cmd, struct scatterlist *sgl, u32 sgl_nents,
619 0, fd_prot.prot_sg, 0); 620 0, fd_prot.prot_sg, 0);
620 if (rc) { 621 if (rc) {
621 kfree(fd_prot.prot_sg); 622 kfree(fd_prot.prot_sg);
622 vfree(fd_prot.prot_buf); 623 kfree(fd_prot.prot_buf);
623 return rc; 624 return rc;
624 } 625 }
625 } 626 }
@@ -655,7 +656,7 @@ fd_execute_rw(struct se_cmd *cmd, struct scatterlist *sgl, u32 sgl_nents,
655 656
656 if (ret < 0) { 657 if (ret < 0) {
657 kfree(fd_prot.prot_sg); 658 kfree(fd_prot.prot_sg);
658 vfree(fd_prot.prot_buf); 659 kfree(fd_prot.prot_buf);
659 return TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE; 660 return TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE;
660 } 661 }
661 662