1. 17 11月, 2007 1 次提交
  2. 10 11月, 2007 1 次提交
    • J
      [CIFS] fix oops on second mount to same server when null auth is used · 9b8f5f57
      Jeff Layton 提交于
      When a share is mounted using no username, cifs_mount sets
      volume_info.username as a NULL pointer, and the sesInfo userName as an
      empty string. The volume_info.username is passed to a couple of other
      functions to see if there is an existing unc or tcp connection that can
      be used. These functions assume that the username will be a valid
      string that can be passed to strncmp. If the pointer is NULL, then the
      kernel will oops if there's an existing session to which the string
      can be compared.
      
      This patch changes cifs_mount to set volume_info.username to an empty
      string in this situation, which prevents the oops and should make it
      so that the comparison to other null auth sessions match.
      Signed-off-by: NJeff Layton <jlayton@redhat.com>
      Signed-off-by: NSteve French <sfrench@us.ibm.com>
      9b8f5f57
  3. 09 11月, 2007 1 次提交
  4. 01 11月, 2007 1 次提交
    • S
      [CIFS] when mount helper missing fix slash wrong direction in share · 1fb64bfc
      Steve French 提交于
      Kernel bugzilla bug #9228
      
      If mount helper (mount.cifs) missing, mounts with form like
      //10.11.12.13/c$ would not work (only mounts with slash e.g.
      //10.11.12.13\\c$ would work) due to problem with slash supposed
      to be converted to backslash by the mount helper (which is not
      there).
      
      If we fail on converting an IPv4 address in in4_pton then
      try to canonicalize the first slash (ie between sharename
      and host ip address) if necessary.  If we have to retry
      to check for IPv6 address the slash is already converted
      if necessary.
      Signed-off-by: NSteve French <sfrench@us.ibm.com>
      1fb64bfc
  5. 30 10月, 2007 1 次提交
  6. 18 10月, 2007 2 次提交
  7. 15 10月, 2007 1 次提交
  8. 12 10月, 2007 1 次提交
  9. 29 9月, 2007 1 次提交
  10. 28 9月, 2007 1 次提交
  11. 24 8月, 2007 1 次提交
  12. 26 7月, 2007 1 次提交
  13. 15 7月, 2007 1 次提交
    • S
      [CIFS] Add support for new POSIX unlink · 2d785a50
      Steve French 提交于
      In the cleanup phase of the dbench test, we were noticing sharing
      violation followed by failed directory removals when dbench
      did not close the test files before the cleanup phase started.
      Using the new POSIX unlink, which Samba has supported for a few
      months, avoids this.
      Signed-off-by: NSteve French <sfrench@us.ibm.com>
      2d785a50
  14. 12 7月, 2007 1 次提交
  15. 09 7月, 2007 1 次提交
  16. 07 7月, 2007 1 次提交
  17. 25 6月, 2007 1 次提交
  18. 05 5月, 2007 1 次提交
    • J
      [CIFS] Make sec=none force an anonymous mount · 8426c39c
      Jeff Layton 提交于
      We had a customer report that attempting to make CIFS mount with a null
      username (i.e. doing an anonymous mount) doesn't work. Looking through the
      code, it looks like CIFS expects a NULL username from userspace in order
      to trigger an anonymous mount. The mount.cifs code doesn't seem to ever
      pass a null username to the kernel, however.
      
      It looks also like the kernel can take a sec=none option, but it only seems
      to look at it if the username is already NULL. This seems redundant and
      effectively makes sec=none useless.
      
      The following patch makes sec=none force an anonymous mount.
      Signed-off-by: NSteve French <sfrench@us.ibm.com>
      8426c39c
  19. 01 5月, 2007 1 次提交
    • S
      [CIFS] UID/GID override on CIFS mounts to Samba · 4523cc30
      Steve French 提交于
      When CIFS Unix Extensions are negotiated we get the Unix uid and gid
      owners of the file from the server (on the Unix Query Path Info
      levels), but if the server's uids don't match the client uid's users
      were having to disable the Unix Extensions (which turned off features
      they still wanted).   The changeset patch allows users to override uid
      and/or gid for file/directory owner with a default uid and/or gid
      specified at mount (as is often done when mounting from Linux cifs
      client to Windows server).  This changeset also displays the uid
      and gid used by default in /proc/mounts (if applicable).
      
      Also cleans up code by adding some of the missing spaces after
      "if" keywords per-kernel style guidelines (as suggested by Randy Dunlap
      when he reviewed the patch).
      Signed-off-by: NSteve French <sfrench@us.ibm.com>
      4523cc30
  20. 25 4月, 2007 1 次提交
    • S
      [CIFS] Add IPv6 support · 5858ae44
      Steve French 提交于
      IPv6 support was started a few years ago in the cifs client, but lacked a
      kernel helper function for parsing the ascii form of the ipv6 address. Now
      that that is added (and now IPv6 is the default that some OS use now) it
      was fairly easy to finish  the cifs ipv6 support.  This  requires that
      CIFS_EXPERIMENTAL be enabled and (at least until the mount.cifs module is
      modified to use a new ipv6 friendly call instead of gethostbyname) and the
      ipv6 address be passed on the mount as "ip=" mount option.
      
      Thanks
      Signed-off-by: NSteve French <sfrench@us.ibm.com>
      5858ae44
  21. 24 4月, 2007 1 次提交
  22. 07 4月, 2007 1 次提交
  23. 23 3月, 2007 1 次提交
  24. 10 3月, 2007 1 次提交
  25. 06 3月, 2007 1 次提交
  26. 27 2月, 2007 1 次提交
  27. 14 2月, 2007 1 次提交
  28. 09 2月, 2007 1 次提交
  29. 07 2月, 2007 1 次提交
  30. 24 12月, 2006 1 次提交
  31. 08 12月, 2006 1 次提交
  32. 02 11月, 2006 1 次提交
  33. 31 10月, 2006 1 次提交
  34. 21 9月, 2006 1 次提交
  35. 17 8月, 2006 1 次提交
  36. 15 8月, 2006 1 次提交
  37. 12 8月, 2006 1 次提交
  38. 27 6月, 2006 1 次提交
  39. 08 6月, 2006 1 次提交
    • S
      [CIFS] NTLMv2 support part 5 · 1717ffc5
      Steve French 提交于
      NTLMv2 authentication (stronger authentication than default NTLM) which
      many servers support now works.  There was a problem with the construction
      of the security blob in the older code.  Currently requires
      	/proc/fs/cifs/Experimental to be set to 2
      and
      	/proc/fs/cifs/SecurityFlags to be set to 0x4004 (to require using
      	NTLMv2 instead of default of NTLM)
      
      Next we will check signing to make sure optional NTLMv2 packet signing also
      works.
      Signed-off-by: NSteve French <sfrench@us.ibm.com>
      1717ffc5