Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4564619imu; Tue, 29 Jan 2019 03:54:19 -0800 (PST) X-Google-Smtp-Source: ALg8bN7EgSwCJTgFCTn0wI22j4vsRHuPcbeOCdtF+BOZjXCej1ihRVp7PwJGDhoQLZVdgHr2vLv8 X-Received: by 2002:a63:70c:: with SMTP id 12mr22723740pgh.352.1548762858971; Tue, 29 Jan 2019 03:54:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548762858; cv=none; d=google.com; s=arc-20160816; b=r0OHDjA067aklwB8f/2Ho4oqCi3UQY+qQhs8ytwWSPXkPBjYUFXGbKj6cYKoJOgaME OypRqk9GQz1kyxsUgaE4p0kC9yKPNLNp2EMly0S0o9z3nP3R9CQ2/GYSVfgog3OBsmZ8 dH+KSDdpR5bd+wmLDZAKq5Gp0H3VqYvS4AMKt3xbOv1fG5ztqE64Jyl5U3IppGMT/gYj X8ZAR6Nxqi5kFnopXRxOuZlaNSMRx8tAttJWySuDdOdw3atNZea5mG2IVg4LLRb/XBdw bEVbXJb9IFhiv0NunAHdV+zg4lcrSMG3bg6dFJ5CWlSieuGD0RTiYbw9J5XQEfcZYMtp TMCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=9+dhqnznTD6C8/B1yloPFMiaYdqxFudoxRPFXqzY31A=; b=PeTVWZsTHLSk3DJ+1iv7OrCd2ngXQeTvZ6bvpw3ouxoxb0oEF2KDwsQGOX1GZzUZlv 1/obnJkshb50MuJ5Q+eoHKm+rFT7GxupJTfsU2YoTQsHVX5yzZXKtwTBFE5rFeRcP+TO KsVXcFaf1p/TURTxHE5ELYtVCrODbKepCQDBs198lFY5vIOByIPRVacKc2/J0PXv98h2 YSDx91bWWIhjgE2I/E2Pgtl13RuI7KCBRYIZvVVXjdQ/2+/LWZjzi5upwElt25tatj5Q jJTLjDvtdnnEf1xIW3FUm6JdG484NTBa+8JvT7GrSOFiRSC4Mu3KTfu7Es8lnyQEXfdB 8vbg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mhrGDO4Q; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c9si7927767pll.439.2019.01.29.03.54.02; Tue, 29 Jan 2019 03:54:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mhrGDO4Q; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732152AbfA2Lwn (ORCPT + 99 others); Tue, 29 Jan 2019 06:52:43 -0500 Received: from mail.kernel.org ([198.145.29.99]:44550 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731038AbfA2Lwl (ORCPT ); Tue, 29 Jan 2019 06:52:41 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0745E2083B; Tue, 29 Jan 2019 11:52:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548762760; bh=nwT3rq+crU4ZFJMx/8Qr7ZZIRt27XwLYX/wl/wsWqkw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mhrGDO4QuRovvF/hw9st1I013xV+LwBE0CDr6q8EawhjNAAy5H4aCaTUQHPiLgkIf CMpdouI6Ohi712dMM8jgZVrOjH81QIsfgnZgGddFf5M4bgb8O4E/YRHPdhG6usuODI X+anq4iVdAfRs7TxJXoKyNHFn3Jrw9k/V8wkWBB0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Pavel Shilovsky , Ronnie Sahlberg , Steve French Subject: [PATCH 4.9 23/44] CIFS: Do not reconnect TCP session in add_credits() Date: Tue, 29 Jan 2019 12:36:18 +0100 Message-Id: <20190129113141.826517383@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190129113139.826927690@linuxfoundation.org> References: <20190129113139.826927690@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Pavel Shilovsky commit ef68e831840c40c7d01b328b3c0f5d8c4796c232 upstream. When executing add_credits() we currently call cifs_reconnect() if the number of credits is zero and there are no requests in flight. In this case we may call cifs_reconnect() recursively twice and cause memory corruption given the following sequence of functions: mid1.callback() -> add_credits() -> cifs_reconnect() -> -> mid2.callback() -> add_credits() -> cifs_reconnect(). Fix this by avoiding to call cifs_reconnect() in add_credits() and checking for zero credits in the demultiplex thread. Cc: Signed-off-by: Pavel Shilovsky Reviewed-by: Ronnie Sahlberg Signed-off-by: Steve French Signed-off-by: Greg Kroah-Hartman --- fs/cifs/connect.c | 21 +++++++++++++++++++++ fs/cifs/smb2ops.c | 32 +++++++++++++++++++++++++------- 2 files changed, 46 insertions(+), 7 deletions(-) --- a/fs/cifs/connect.c +++ b/fs/cifs/connect.c @@ -518,6 +518,21 @@ server_unresponsive(struct TCP_Server_In return false; } +static inline bool +zero_credits(struct TCP_Server_Info *server) +{ + int val; + + spin_lock(&server->req_lock); + val = server->credits + server->echo_credits + server->oplock_credits; + if (server->in_flight == 0 && val == 0) { + spin_unlock(&server->req_lock); + return true; + } + spin_unlock(&server->req_lock); + return false; +} + static int cifs_readv_from_socket(struct TCP_Server_Info *server, struct msghdr *smb_msg) { @@ -530,6 +545,12 @@ cifs_readv_from_socket(struct TCP_Server for (total_read = 0; msg_data_left(smb_msg); total_read += length) { try_to_freeze(); + /* reconnect if no credits and no requests in flight */ + if (zero_credits(server)) { + cifs_reconnect(server); + return -ECONNABORTED; + } + if (server_unresponsive(server)) return -ECONNABORTED; --- a/fs/cifs/smb2ops.c +++ b/fs/cifs/smb2ops.c @@ -30,6 +30,7 @@ #include "smb2glob.h" #include "cifs_ioctl.h" +/* Change credits for different ops and return the total number of credits */ static int change_conf(struct TCP_Server_Info *server) { @@ -37,17 +38,15 @@ change_conf(struct TCP_Server_Info *serv server->oplock_credits = server->echo_credits = 0; switch (server->credits) { case 0: - return -1; + return 0; case 1: server->echoes = false; server->oplocks = false; - cifs_dbg(VFS, "disabling echoes and oplocks\n"); break; case 2: server->echoes = true; server->oplocks = false; server->echo_credits = 1; - cifs_dbg(FYI, "disabling oplocks\n"); break; default: server->echoes = true; @@ -60,14 +59,15 @@ change_conf(struct TCP_Server_Info *serv server->echo_credits = 1; } server->credits -= server->echo_credits + server->oplock_credits; - return 0; + return server->credits + server->echo_credits + server->oplock_credits; } static void smb2_add_credits(struct TCP_Server_Info *server, const unsigned int add, const int optype) { - int *val, rc = 0; + int *val, rc = -1; + spin_lock(&server->req_lock); val = server->ops->get_credits_field(server, optype); *val += add; @@ -91,8 +91,26 @@ smb2_add_credits(struct TCP_Server_Info } spin_unlock(&server->req_lock); wake_up(&server->request_q); - if (rc) - cifs_reconnect(server); + + if (server->tcpStatus == CifsNeedReconnect) + return; + + switch (rc) { + case -1: + /* change_conf hasn't been executed */ + break; + case 0: + cifs_dbg(VFS, "Possible client or server bug - zero credits\n"); + break; + case 1: + cifs_dbg(VFS, "disabling echoes and oplocks\n"); + break; + case 2: + cifs_dbg(FYI, "disabling oplocks\n"); + break; + default: + cifs_dbg(FYI, "add %u credits total=%d\n", add, rc); + } } static void