1. 06 7月, 2018 1 次提交
    • L
      cifs: Fix use after free of a mid_q_entry · 696e420b
      Lars Persson 提交于
      With protocol version 2.0 mounts we have seen crashes with corrupt mid
      entries. Either the server->pending_mid_q list becomes corrupt with a
      cyclic reference in one element or a mid object fetched by the
      demultiplexer thread becomes overwritten during use.
      
      Code review identified a race between the demultiplexer thread and the
      request issuing thread. The demultiplexer thread seems to be written
      with the assumption that it is the sole user of the mid object until
      it calls the mid callback which either wakes the issuer task or
      deletes the mid.
      
      This assumption is not true because the issuer task can be woken up
      earlier by a signal. If the demultiplexer thread has proceeded as far
      as setting the mid_state to MID_RESPONSE_RECEIVED then the issuer
      thread will happily end up calling cifs_delete_mid while the
      demultiplexer thread still is using the mid object.
      
      Inserting a delay in the cifs demultiplexer thread widens the race
      window and makes reproduction of the race very easy:
      
      		if (server->large_buf)
      			buf = server->bigbuf;
      
      +		usleep_range(500, 4000);
      
      		server->lstrp = jiffies;
      
      To resolve this I think the proper solution involves putting a
      reference count on the mid object. This patch makes sure that the
      demultiplexer thread holds a reference until it has finished
      processing the transaction.
      
      Cc: stable@vger.kernel.org
      Signed-off-by: NLars Persson <larper@axis.com>
      Acked-by: NPaulo Alcantara <palcantara@suse.de>
      Reviewed-by: NRonnie Sahlberg <lsahlber@redhat.com>
      Reviewed-by: NPavel Shilovsky <pshilov@microsoft.com>
      Signed-off-by: NSteve French <stfrench@microsoft.com>
      696e420b
  2. 16 6月, 2018 1 次提交
  3. 15 6月, 2018 5 次提交
  4. 08 6月, 2018 1 次提交
  5. 07 6月, 2018 1 次提交
  6. 06 6月, 2018 1 次提交
  7. 03 6月, 2018 2 次提交
  8. 01 6月, 2018 4 次提交
  9. 31 5月, 2018 2 次提交
  10. 28 5月, 2018 4 次提交
  11. 10 5月, 2018 1 次提交
    • P
      cifs: smb2ops: Fix listxattr() when there are no EAs · ae2cd7fb
      Paulo Alcantara 提交于
      As per listxattr(2):
      
             On success, a nonnegative number is returned indicating the size
             of the extended attribute name list.  On failure, -1 is returned
             and errno  is set appropriately.
      
      In SMB1, when the server returns an empty EA list through a listxattr(),
      it will correctly return 0 as there are no EAs for the given file.
      
      However, in SMB2+, it returns -ENODATA in listxattr() which is wrong since
      the request and response were sent successfully, although there's no actual
      EA for the given file.
      
      This patch fixes listxattr() for SMB2+ by returning 0 in cifs_listxattr()
      when the server returns an empty list of EAs.
      Signed-off-by: NPaulo Alcantara <palcantara@suse.de>
      Reviewed-by: NAurelien Aptel <aaptel@suse.com>
      Signed-off-by: NSteve French <smfrench@gmail.com>
      ae2cd7fb
  12. 26 4月, 2018 1 次提交
  13. 18 4月, 2018 1 次提交
  14. 13 4月, 2018 2 次提交
  15. 03 4月, 2018 1 次提交
  16. 02 4月, 2018 2 次提交
  17. 27 1月, 2018 1 次提交
  18. 25 1月, 2018 2 次提交
  19. 07 12月, 2017 1 次提交
  20. 03 11月, 2017 1 次提交
  21. 19 10月, 2017 1 次提交
  22. 18 9月, 2017 2 次提交
    • A
      cifs: hide unused functions · 1368f155
      Arnd Bergmann 提交于
      The newly added SMB2+ attribute support causes unused function
      warnings when CONFIG_CIFS_XATTR is disabled:
      
      fs/cifs/smb2ops.c:563:1: error: 'smb2_set_ea' defined but not used [-Werror=unused-function]
       smb2_set_ea(const unsigned int xid, struct cifs_tcon *tcon,
      fs/cifs/smb2ops.c:513:1: error: 'smb2_query_eas' defined but not used [-Werror=unused-function]
       smb2_query_eas(const unsigned int xid, struct cifs_tcon *tcon,
      
      This adds another #ifdef around the affected functions.
      
      Fixes: 5517554e ("cifs: Add support for writing attributes on SMB2+")
      Fixes: 95907fea ("cifs: Add support for reading attributes on SMB2+")
      Signed-off-by: NArnd Bergmann <arnd@arndb.de>
      Acked-by: NGeert Uytterhoeven <geert@linux-m68k.org>
      Signed-off-by: NSteve French <smfrench@gmail.com>
      1368f155
    • S
      SMB3: Add support for multidialect negotiate (SMB2.1 and later) · 9764c02f
      Steve French 提交于
      With the need to discourage use of less secure dialect, SMB1 (CIFS),
      we temporarily upgraded the dialect to SMB3 in 4.13, but since there
      are various servers which only support SMB2.1 (2.1 is more secure
      than CIFS/SMB1) but not optimal for a default dialect - add support
      for multidialect negotiation.  cifs.ko will now request SMB2.1
      or later (ie SMB2.1 or SMB3.0, SMB3.02) and the server will
      pick the latest most secure one it can support.
      
      In addition since we are sending multidialect negotiate, add
      support for secure negotiate to validate that a man in the
      middle didn't downgrade us.
      Signed-off-by: NSteve French <smfrench@gmail.com>
      Reviewed-by: NPavel Shilovsky <pshilov@microsoft.com>
      CC: Stable <stable@vger.kernel.org> # 4.13+
      9764c02f
  23. 05 9月, 2017 2 次提交