Skip to content

Commit bf8acc9

Browse files
hcleesmfrench
authored andcommitted
ksmbd: improve credits management
* Requests except READ, WRITE, IOCTL, INFO, QUERY DIRECOTRY, CANCEL must consume one credit. * If client's granted credits are insufficient, refuse to handle requests. * Windows server 2016 or later grant up to 8192 credits to clients at once. Acked-by: Namjae Jeon <[email protected]> Signed-off-by: Hyunchul Lee <[email protected]> Signed-off-by: Steve French <[email protected]>
1 parent f7db8fd commit bf8acc9

File tree

3 files changed

+59
-62
lines changed

3 files changed

+59
-62
lines changed

fs/ksmbd/connection.c

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,8 @@ struct ksmbd_conn *ksmbd_conn_alloc(void)
6161
conn->local_nls = load_nls_default();
6262
atomic_set(&conn->req_running, 0);
6363
atomic_set(&conn->r_count, 0);
64+
conn->total_credits = 1;
65+
6466
init_waitqueue_head(&conn->req_running_q);
6567
INIT_LIST_HEAD(&conn->conns_list);
6668
INIT_LIST_HEAD(&conn->sessions);

fs/ksmbd/smb2misc.c

Lines changed: 28 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -284,11 +284,13 @@ static inline int smb2_ioctl_resp_len(struct smb2_ioctl_req *h)
284284
le32_to_cpu(h->MaxOutputResponse);
285285
}
286286

287-
static int smb2_validate_credit_charge(struct smb2_hdr *hdr)
287+
static int smb2_validate_credit_charge(struct ksmbd_conn *conn,
288+
struct smb2_hdr *hdr)
288289
{
289-
int req_len = 0, expect_resp_len = 0, calc_credit_num, max_len;
290-
int credit_charge = le16_to_cpu(hdr->CreditCharge);
290+
unsigned int req_len = 0, expect_resp_len = 0, calc_credit_num, max_len;
291+
unsigned short credit_charge = le16_to_cpu(hdr->CreditCharge);
291292
void *__hdr = hdr;
293+
int ret;
292294

293295
switch (hdr->Command) {
294296
case SMB2_QUERY_INFO:
@@ -310,21 +312,37 @@ static int smb2_validate_credit_charge(struct smb2_hdr *hdr)
310312
req_len = smb2_ioctl_req_len(__hdr);
311313
expect_resp_len = smb2_ioctl_resp_len(__hdr);
312314
break;
313-
default:
315+
case SMB2_CANCEL:
314316
return 0;
317+
default:
318+
req_len = 1;
319+
break;
315320
}
316321

317-
credit_charge = max(1, credit_charge);
318-
max_len = max(req_len, expect_resp_len);
322+
credit_charge = max_t(unsigned short, credit_charge, 1);
323+
max_len = max_t(unsigned int, req_len, expect_resp_len);
319324
calc_credit_num = DIV_ROUND_UP(max_len, SMB2_MAX_BUFFER_SIZE);
320325

321326
if (credit_charge < calc_credit_num) {
322-
pr_err("Insufficient credit charge, given: %d, needed: %d\n",
323-
credit_charge, calc_credit_num);
327+
ksmbd_debug(SMB, "Insufficient credit charge, given: %d, needed: %d\n",
328+
credit_charge, calc_credit_num);
329+
return 1;
330+
} else if (credit_charge > conn->max_credits) {
331+
ksmbd_debug(SMB, "Too large credit charge: %d\n", credit_charge);
324332
return 1;
325333
}
326334

327-
return 0;
335+
spin_lock(&conn->credits_lock);
336+
if (credit_charge <= conn->total_credits) {
337+
conn->total_credits -= credit_charge;
338+
ret = 0;
339+
} else {
340+
ksmbd_debug(SMB, "Insufficient credits granted, given: %u, granted: %u\n",
341+
credit_charge, conn->total_credits);
342+
ret = 1;
343+
}
344+
spin_unlock(&conn->credits_lock);
345+
return ret;
328346
}
329347

330348
int ksmbd_smb2_check_message(struct ksmbd_work *work)
@@ -383,7 +401,7 @@ int ksmbd_smb2_check_message(struct ksmbd_work *work)
383401
}
384402

385403
if ((work->conn->vals->capabilities & SMB2_GLOBAL_CAP_LARGE_MTU) &&
386-
smb2_validate_credit_charge(hdr)) {
404+
smb2_validate_credit_charge(work->conn, hdr)) {
387405
work->conn->ops->set_rsp_status(work, STATUS_INVALID_PARAMETER);
388406
return 1;
389407
}

fs/ksmbd/smb2pdu.c

Lines changed: 29 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -292,22 +292,6 @@ int init_smb2_neg_rsp(struct ksmbd_work *work)
292292
return 0;
293293
}
294294

295-
static int smb2_consume_credit_charge(struct ksmbd_work *work,
296-
unsigned short credit_charge)
297-
{
298-
struct ksmbd_conn *conn = work->conn;
299-
unsigned int rsp_credits = 1;
300-
301-
if (!conn->total_credits)
302-
return 0;
303-
304-
if (credit_charge > 0)
305-
rsp_credits = credit_charge;
306-
307-
conn->total_credits -= rsp_credits;
308-
return rsp_credits;
309-
}
310-
311295
/**
312296
* smb2_set_rsp_credits() - set number of credits in response buffer
313297
* @work: smb work containing smb response buffer
@@ -317,49 +301,43 @@ int smb2_set_rsp_credits(struct ksmbd_work *work)
317301
struct smb2_hdr *req_hdr = ksmbd_req_buf_next(work);
318302
struct smb2_hdr *hdr = ksmbd_resp_buf_next(work);
319303
struct ksmbd_conn *conn = work->conn;
320-
unsigned short credits_requested = le16_to_cpu(req_hdr->CreditRequest);
321-
unsigned short credit_charge = 1, credits_granted = 0;
322-
unsigned short aux_max, aux_credits, min_credits;
323-
int rsp_credit_charge;
304+
unsigned short credits_requested;
305+
unsigned short credit_charge, credits_granted = 0;
306+
unsigned short aux_max, aux_credits;
324307

325-
if (hdr->Command == SMB2_CANCEL)
326-
goto out;
308+
if (work->send_no_response)
309+
return 0;
327310

328-
/* get default minimum credits by shifting maximum credits by 4 */
329-
min_credits = conn->max_credits >> 4;
311+
hdr->CreditCharge = req_hdr->CreditCharge;
330312

331-
if (conn->total_credits >= conn->max_credits) {
313+
if (conn->total_credits > conn->max_credits) {
314+
hdr->CreditRequest = 0;
332315
pr_err("Total credits overflow: %d\n", conn->total_credits);
333-
conn->total_credits = min_credits;
334-
}
335-
336-
rsp_credit_charge =
337-
smb2_consume_credit_charge(work, le16_to_cpu(req_hdr->CreditCharge));
338-
if (rsp_credit_charge < 0)
339316
return -EINVAL;
317+
}
340318

341-
hdr->CreditCharge = cpu_to_le16(rsp_credit_charge);
319+
credit_charge = max_t(unsigned short,
320+
le16_to_cpu(req_hdr->CreditCharge), 1);
321+
credits_requested = max_t(unsigned short,
322+
le16_to_cpu(req_hdr->CreditRequest), 1);
342323

343-
if (credits_requested > 0) {
344-
aux_credits = credits_requested - 1;
345-
aux_max = 32;
346-
if (hdr->Command == SMB2_NEGOTIATE)
347-
aux_max = 0;
348-
aux_credits = (aux_credits < aux_max) ? aux_credits : aux_max;
349-
credits_granted = aux_credits + credit_charge;
324+
/* according to smb2.credits smbtorture, Windows server
325+
* 2016 or later grant up to 8192 credits at once.
326+
*
327+
* TODO: Need to adjuct CreditRequest value according to
328+
* current cpu load
329+
*/
330+
aux_credits = credits_requested - 1;
331+
if (hdr->Command == SMB2_NEGOTIATE)
332+
aux_max = 0;
333+
else
334+
aux_max = conn->max_credits - credit_charge;
335+
aux_credits = min_t(unsigned short, aux_credits, aux_max);
336+
credits_granted = credit_charge + aux_credits;
350337

351-
/* if credits granted per client is getting bigger than default
352-
* minimum credits then we should wrap it up within the limits.
353-
*/
354-
if ((conn->total_credits + credits_granted) > min_credits)
355-
credits_granted = min_credits - conn->total_credits;
356-
/*
357-
* TODO: Need to adjuct CreditRequest value according to
358-
* current cpu load
359-
*/
360-
} else if (conn->total_credits == 0) {
361-
credits_granted = 1;
362-
}
338+
if (conn->max_credits - conn->total_credits < credits_granted)
339+
credits_granted = conn->max_credits -
340+
conn->total_credits;
363341

364342
conn->total_credits += credits_granted;
365343
work->credits_granted += credits_granted;
@@ -368,7 +346,6 @@ int smb2_set_rsp_credits(struct ksmbd_work *work)
368346
/* Update CreditRequest in last request */
369347
hdr->CreditRequest = cpu_to_le16(work->credits_granted);
370348
}
371-
out:
372349
ksmbd_debug(SMB,
373350
"credits: requested[%d] granted[%d] total_granted[%d]\n",
374351
credits_requested, credits_granted,

0 commit comments

Comments
 (0)