On Fri, 2018-11-30 at 16:23 -0500, Chuck Lever wrote: > > On Nov 30, 2018, at 4:18 PM, Trond Myklebust <trondmy@xxxxxxxxx> > > wrote: > > > > A call to gss_wrap_req_priv() will end up replacing the original > > array > > in rqstp->rq_snd_buf.pages with a new one containing the encrypted > > data. In order to avoid having the rqstp->rq_snd_buf.bvec point to > > the > > wrong page data, we need to refresh that too. > > > > Signed-off-by: Trond Myklebust <trond.myklebust@xxxxxxxxxxxxxxx> > > --- > > net/sunrpc/xprtsock.c | 1 + > > 1 file changed, 1 insertion(+) > > > > diff --git a/net/sunrpc/xprtsock.c b/net/sunrpc/xprtsock.c > > index ae77c71c1f64..615ef2397fc5 100644 > > --- a/net/sunrpc/xprtsock.c > > +++ b/net/sunrpc/xprtsock.c > > @@ -843,6 +843,7 @@ static int xs_nospace(struct rpc_rqst *req) > > static void > > xs_stream_prepare_request(struct rpc_rqst *req) > > { > > + xdr_free_bvec(&req->rq_rcv_buf); > > I've added a pr_warn that fires whenever rq_rcv_buf.bvec != NULL, > and it never made a peep. Am I missing something? > It may be non-NULL, but contain an array of pointers to the wrong pages. That's going to be the case when we re-encode the request, because (as your patch pointed out) we free the old array of rq_enc_pages (and its contents) and allocate a whole new array + set of pages. > > > req->rq_task->tk_status = xdr_alloc_bvec(&req->rq_rcv_buf, > > GFP_NOIO); > > } > > > > -- > > 2.19.2 > > > > -- > Chuck Lever > > >