Message ID | 1503613000-2319-1-git-send-email-pshilov@microsoft.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Tested it successfully with a reproducer listed in rh bz 1484099. # mkdir t1; for i in {1..1000}; do touch t1/aaaaaaaaaaaaaaaaaaaa$i; done # find t1 Acked-by: Sachin Prabhu <sprabhu@redhat.com> On Thu, Aug 24, 2017 at 11:16 PM, Pavel Shilovsky <pshilov@microsoft.com> wrote: > Currently the maximum size of SMB2/3 header is set incorrectly which > leads to hanging of directory listing operations on encrypted SMB3 > connections. Fix this by setting the maximum size to 170 bytes that > is calculated as RFC1002 length field size (4) + transform header > size (52) + SMB2 header size (64) + create response size (56). > > Cc: <stable@vger.kernel.org> > Signed-off-by: Pavel Shilovsky <pshilov@microsoft.com> > --- > fs/cifs/smb2pdu.h | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/fs/cifs/smb2pdu.h b/fs/cifs/smb2pdu.h > index 18700fd..2826882 100644 > --- a/fs/cifs/smb2pdu.h > +++ b/fs/cifs/smb2pdu.h > @@ -84,8 +84,8 @@ > > #define NUMBER_OF_SMB2_COMMANDS 0x0013 > > -/* BB FIXME - analyze following length BB */ > -#define MAX_SMB2_HDR_SIZE 0x78 /* 4 len + 64 hdr + (2*24 wct) + 2 bct + 2 pad */ > +/* 4 len + 52 transform hdr + 64 hdr + 56 create rsp */ > +#define MAX_SMB2_HDR_SIZE 0x00b0 > > #define SMB2_PROTO_NUMBER cpu_to_le32(0x424d53fe) > #define SMB2_TRANSFORM_PROTO_NUM cpu_to_le32(0x424d53fd) > -- > 2.7.4 > > -- > To unsubscribe from this list: send the line "unsubscribe linux-cifs" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html -- To unsubscribe from this list: send the line "unsubscribe linux-cifs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
merged into cifs-2.6.git for-next On Fri, Aug 25, 2017 at 4:05 AM, Sachin Prabhu <sprabhu@redhat.com> wrote: > Tested it successfully with a reproducer listed in rh bz 1484099. > > # mkdir t1; for i in {1..1000}; do touch t1/aaaaaaaaaaaaaaaaaaaa$i; done > # find t1 > > Acked-by: Sachin Prabhu <sprabhu@redhat.com> > > On Thu, Aug 24, 2017 at 11:16 PM, Pavel Shilovsky <pshilov@microsoft.com> > wrote: >> >> Currently the maximum size of SMB2/3 header is set incorrectly which >> leads to hanging of directory listing operations on encrypted SMB3 >> connections. Fix this by setting the maximum size to 170 bytes that >> is calculated as RFC1002 length field size (4) + transform header >> size (52) + SMB2 header size (64) + create response size (56). >> >> Cc: <stable@vger.kernel.org> >> Signed-off-by: Pavel Shilovsky <pshilov@microsoft.com> >> --- >> fs/cifs/smb2pdu.h | 4 ++-- >> 1 file changed, 2 insertions(+), 2 deletions(-) >> >> diff --git a/fs/cifs/smb2pdu.h b/fs/cifs/smb2pdu.h >> index 18700fd..2826882 100644 >> --- a/fs/cifs/smb2pdu.h >> +++ b/fs/cifs/smb2pdu.h >> @@ -84,8 +84,8 @@ >> >> #define NUMBER_OF_SMB2_COMMANDS 0x0013 >> >> -/* BB FIXME - analyze following length BB */ >> -#define MAX_SMB2_HDR_SIZE 0x78 /* 4 len + 64 hdr + (2*24 wct) + 2 bct + 2 >> pad */ >> +/* 4 len + 52 transform hdr + 64 hdr + 56 create rsp */ >> +#define MAX_SMB2_HDR_SIZE 0x00b0 >> >> #define SMB2_PROTO_NUMBER cpu_to_le32(0x424d53fe) >> #define SMB2_TRANSFORM_PROTO_NUM cpu_to_le32(0x424d53fd) >> -- >> 2.7.4 >> >> -- >> To unsubscribe from this list: send the line "unsubscribe linux-cifs" in >> the body of a message to majordomo@vger.kernel.org >> More majordomo info at http://vger.kernel.org/majordomo-info.html > >
diff --git a/fs/cifs/smb2pdu.h b/fs/cifs/smb2pdu.h index 18700fd..2826882 100644 --- a/fs/cifs/smb2pdu.h +++ b/fs/cifs/smb2pdu.h @@ -84,8 +84,8 @@ #define NUMBER_OF_SMB2_COMMANDS 0x0013 -/* BB FIXME - analyze following length BB */ -#define MAX_SMB2_HDR_SIZE 0x78 /* 4 len + 64 hdr + (2*24 wct) + 2 bct + 2 pad */ +/* 4 len + 52 transform hdr + 64 hdr + 56 create rsp */ +#define MAX_SMB2_HDR_SIZE 0x00b0 #define SMB2_PROTO_NUMBER cpu_to_le32(0x424d53fe) #define SMB2_TRANSFORM_PROTO_NUM cpu_to_le32(0x424d53fd)
Currently the maximum size of SMB2/3 header is set incorrectly which leads to hanging of directory listing operations on encrypted SMB3 connections. Fix this by setting the maximum size to 170 bytes that is calculated as RFC1002 length field size (4) + transform header size (52) + SMB2 header size (64) + create response size (56). Cc: <stable@vger.kernel.org> Signed-off-by: Pavel Shilovsky <pshilov@microsoft.com> --- fs/cifs/smb2pdu.h | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)