Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1236016ybb; Wed, 25 Mar 2020 19:02:54 -0700 (PDT) X-Google-Smtp-Source: ADFU+vtkG0dqxndNoB0uDvneKN+bN9VHoTxHc+7syMuZBSd/oTdF0W5VQeOM+gmLs7bSmCb6R4Je X-Received: by 2002:a9d:2c69:: with SMTP id f96mr4478925otb.62.1585188174746; Wed, 25 Mar 2020 19:02:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585188174; cv=none; d=google.com; s=arc-20160816; b=mybVPFHHocEX3gbiRK3DUZeyhkBmIEm2lJDIptJlrSBLyfmL8tRfRhIri/FE7U9LYN vIpXOOnZPw8sedpqU4O0lfJKvV7YgZTpp2hJfPiXDE6lbWMS6OdeGvDN0NUnjBm9aVDl +DxsVnqPlcsVsFlLvNZqStzZ7topf/gc41N0DxixWX9gj9Ux0fiGPS8W+/izeCKOfmq5 GrVgDmydCzOeZPU+6lsFo8alyiygRThCW9C+1IkLDJLAPWXKeLYM53Y/R+hwELmk9kuV C57rntYJWb7NxjAD/5xNVo3CGVZ3fIekfvZAK/6mwrJ1gBpT71vYT7RdMzn44I8CQVBO qb+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=4xp15kfS5NUhuffpTH0eDvjkAD1zDSgezpo7dNfleWM=; b=WIZLqeJ6Z8bxtBuO8kXdoni7DXVmBvy/DltyOCsQfxKTK3iD2/zFusYCM/eNmc6wNG vM6AllfpnTQ/hdcBPNvzWSO5sY6ZtyFRe0brt4hhCZ0RS8zXf1H37NrITwxSy7lnNYTb Mw4mrSpICTlsiJ2AjHwRmvHi/Wa29tIT98jXnGSVzKB6Z+6/WuB6xoxUwuNztyMpCAfh jCHBmIeZGMxRecksO56lk/V01MBT2KbnjYfoanU9P7SqGxsPXVKa2++n4iVuaboS98z+ IzuS8jZmh0rpdPfcon9lDuRFIigP/VgTNMFzwPqrfgI7hzPDdKKm3dMV9HmQiLCtfC00 9nPg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=A470PTWm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w24si446697otq.131.2020.03.25.19.02.40; Wed, 25 Mar 2020 19:02:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=A470PTWm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727670AbgCZCCT (ORCPT + 99 others); Wed, 25 Mar 2020 22:02:19 -0400 Received: from mail-io1-f67.google.com ([209.85.166.67]:37489 "EHLO mail-io1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727561AbgCZCCS (ORCPT ); Wed, 25 Mar 2020 22:02:18 -0400 Received: by mail-io1-f67.google.com with SMTP id q9so4508262iod.4; Wed, 25 Mar 2020 19:02:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=4xp15kfS5NUhuffpTH0eDvjkAD1zDSgezpo7dNfleWM=; b=A470PTWmd3GEYYQ4A9YPKgbChJGyiY4F/5V6tcTy0Ga8tbBdJSYPz/yC1fvPflKC8t WT1IfvFT5UA8wR63Th2NKqY/PfnKZBL2AlVbiXDux3dX32OD+3x48cmCev8maPRSMctw fpJ2WGSxh3ZXObrhTsnQjWHPAF7jDOWQon21L1ZpOloI/0Aw7A7OxyIAFk6q9OCaypmO asZ8yswb5cUYK7ryzf6JBnfJ3G3zJWWwcZnMccr2dxbWr5hbvukhmq+Jj9Usat4VM6xk LZyyXwmJTzoZjDhXYwz4nKOePITfEIm/WUbVlGg86nkknSWbaIs5H5iqcDmYuBmLO+F7 UoXg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=4xp15kfS5NUhuffpTH0eDvjkAD1zDSgezpo7dNfleWM=; b=pra/aJfty1EJRUqmW7F2zQSUGN4zZZjBPXk03d9/LvoQkv5AhDYoskiSlkGyucDvE0 hNwkTmP65A/QdhbnMLwx7B5Pml2uBa7LNHxb2+KwPeYt9dLuOJnaFMG0qjYG9F07PQlN hU3SNcOU2ylopVuzxFD3jxx2eypv9xX/b4nUK3YHSWmZLEOmDT30SaeKFlsb4ZDs79Y7 q5PKsH9HzyisxPtpZ+qr5v4eaAP41DlV7V2e1ianWd1I9CaTUzBp8Q+Lqwzv5/w871HV 0hh08srYPXzL6GmDU9awMvZNyDQgartF1sI51gkLDkjr5HniLrL9G4eCPtTr5aAPvQwp eA9Q== X-Gm-Message-State: ANhLgQ35tko9PXHfiWIxhRy3bi89uxKtVZyKZ+CYw0vZnD26d4lyM7Bc uLSY0ncxDejqUeovzaWDt/anRiStbxFM/zuVMyw= X-Received: by 2002:a05:6638:a99:: with SMTP id 25mr5874582jas.37.1585188137103; Wed, 25 Mar 2020 19:02:17 -0700 (PDT) MIME-Version: 1.0 References: <1585164614-123696-1-git-send-email-longli@linuxonhyperv.com> In-Reply-To: <1585164614-123696-1-git-send-email-longli@linuxonhyperv.com> From: ronnie sahlberg Date: Thu, 26 Mar 2020 12:02:05 +1000 Message-ID: Subject: Re: [PATCH] cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive To: Long Li Cc: Steve French , linux-cifs , "samba-technical@lists.samba.org" , LKML , longli@linuxonhyperv.com Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Long Li, Mostly looks good but the magic constant 49 I think is wrong. 49 is the structure size of the read/write request header but for these sizes, if they are odd it just means that the header contain a variable sized blob. I.e. the size is 48 bytes (for the fixed part of the header) + a variable part which in this case are the ChannelInfo blobs. So we should probably add to smb2pdu.h a #define MAX_SMB2_READWRITE_RESPONSE_SIZE 48 and use this in the calculations. Then we need to add the maximum size we will use for ChannelInfo. Maybe we should have a define also for the MAX_SMB2_CHANNEL_INFO_SIZE regards ronnie sahlberg On Thu, Mar 26, 2020 at 5:31 AM longli--- via samba-technical wrote: > > From: Long Li > > The packet size needs to take account of SMB2 header size and possible > encryption header size. This is only done when signing is used and it is for > RDMA send/receive, not read/write. > > Also remove the dead SMBD code in smb2_negotiate_r(w)size. > > Signed-off-by: Long Li > --- > fs/cifs/smb2ops.c | 38 ++++++++++++++++---------------------- > fs/cifs/smbdirect.c | 3 +-- > 2 files changed, 17 insertions(+), 24 deletions(-) > > diff --git a/fs/cifs/smb2ops.c b/fs/cifs/smb2ops.c > index 4c0922596467..9043d34eef43 100644 > --- a/fs/cifs/smb2ops.c > +++ b/fs/cifs/smb2ops.c > @@ -332,16 +332,6 @@ smb2_negotiate_wsize(struct cifs_tcon *tcon, struct smb_vol *volume_info) > /* start with specified wsize, or default */ > wsize = volume_info->wsize ? volume_info->wsize : CIFS_DEFAULT_IOSIZE; > wsize = min_t(unsigned int, wsize, server->max_write); > -#ifdef CONFIG_CIFS_SMB_DIRECT > - if (server->rdma) { > - if (server->sign) > - wsize = min_t(unsigned int, > - wsize, server->smbd_conn->max_fragmented_send_size); > - else > - wsize = min_t(unsigned int, > - wsize, server->smbd_conn->max_readwrite_size); > - } > -#endif > if (!(server->capabilities & SMB2_GLOBAL_CAP_LARGE_MTU)) > wsize = min_t(unsigned int, wsize, SMB2_MAX_BUFFER_SIZE); > > @@ -360,8 +350,15 @@ smb3_negotiate_wsize(struct cifs_tcon *tcon, struct smb_vol *volume_info) > #ifdef CONFIG_CIFS_SMB_DIRECT > if (server->rdma) { > if (server->sign) > + /* > + * Account for SMB2 data transfer packet header > + * SMB2_READ/SMB2_WRITE (49) and possible encryption > + * headers > + */ > wsize = min_t(unsigned int, > - wsize, server->smbd_conn->max_fragmented_send_size); > + wsize, > + server->smbd_conn->max_fragmented_send_size - > + 49 - sizeof(struct smb2_transform_hdr)); > else > wsize = min_t(unsigned int, > wsize, server->smbd_conn->max_readwrite_size); > @@ -382,16 +379,6 @@ smb2_negotiate_rsize(struct cifs_tcon *tcon, struct smb_vol *volume_info) > /* start with specified rsize, or default */ > rsize = volume_info->rsize ? volume_info->rsize : CIFS_DEFAULT_IOSIZE; > rsize = min_t(unsigned int, rsize, server->max_read); > -#ifdef CONFIG_CIFS_SMB_DIRECT > - if (server->rdma) { > - if (server->sign) > - rsize = min_t(unsigned int, > - rsize, server->smbd_conn->max_fragmented_recv_size); > - else > - rsize = min_t(unsigned int, > - rsize, server->smbd_conn->max_readwrite_size); > - } > -#endif > > if (!(server->capabilities & SMB2_GLOBAL_CAP_LARGE_MTU)) > rsize = min_t(unsigned int, rsize, SMB2_MAX_BUFFER_SIZE); > @@ -411,8 +398,15 @@ smb3_negotiate_rsize(struct cifs_tcon *tcon, struct smb_vol *volume_info) > #ifdef CONFIG_CIFS_SMB_DIRECT > if (server->rdma) { > if (server->sign) > + /* > + * Account for SMB2 data transfer packet header > + * SMB2_READ/SMB2_WRITE (49) and possible encryption > + * headers > + */ > rsize = min_t(unsigned int, > - rsize, server->smbd_conn->max_fragmented_recv_size); > + rsize, > + server->smbd_conn->max_fragmented_recv_size - > + 49 - sizeof(struct smb2_transform_hdr)); > else > rsize = min_t(unsigned int, > rsize, server->smbd_conn->max_readwrite_size); > diff --git a/fs/cifs/smbdirect.c b/fs/cifs/smbdirect.c > index eb1e40af9f3a..0327b575ab87 100644 > --- a/fs/cifs/smbdirect.c > +++ b/fs/cifs/smbdirect.c > @@ -2097,8 +2097,7 @@ int smbd_send(struct TCP_Server_Info *server, > for (i = 0; i < num_rqst; i++) > remaining_data_length += smb_rqst_len(server, &rqst_array[i]); > > - if (remaining_data_length + sizeof(struct smbd_data_transfer) > > - info->max_fragmented_send_size) { > + if (remaining_data_length > info->max_fragmented_send_size) { > log_write(ERR, "payload size %d > max size %d\n", > remaining_data_length, info->max_fragmented_send_size); > rc = -EINVAL; > -- > 2.17.1 > >