Commit fa4022cb authored by Linus Torvalds's avatar Linus Torvalds

Merge tag 'v6.9-rc3-SMB3-client-fixes' of git://git.samba.org/sfrench/cifs-2.6

Pull smb client fixes from Steve French:

 - fix for oops in cifs_get_fattr of deleted files

 - fix for the remote open counter going negative in some directory
   lease cases

 - fix for mkfifo to instantiate dentry to avoid possible crash

 - important fix to allow handling key rotation for mount and remount
   (ie cases that are becoming more common when password that was used
   for the mount will expire soon but will be replaced by new password)

* tag 'v6.9-rc3-SMB3-client-fixes' of git://git.samba.org/sfrench/cifs-2.6:
  smb3: fix broken reconnect when password changing on the server by allowing password rotation
  smb: client: instantiate when creating SFU files
  smb3: fix Open files on server counter going negative
  smb: client: fix NULL ptr deref in cifs_mark_open_handles_for_deleted_file()
parents 8f2c0577 35f83426
...@@ -433,8 +433,8 @@ smb2_close_cached_fid(struct kref *ref) ...@@ -433,8 +433,8 @@ smb2_close_cached_fid(struct kref *ref)
if (cfid->is_open) { if (cfid->is_open) {
rc = SMB2_close(0, cfid->tcon, cfid->fid.persistent_fid, rc = SMB2_close(0, cfid->tcon, cfid->fid.persistent_fid,
cfid->fid.volatile_fid); cfid->fid.volatile_fid);
if (rc != -EBUSY && rc != -EAGAIN) if (rc) /* should we retry on -EBUSY or -EAGAIN? */
atomic_dec(&cfid->tcon->num_remote_opens); cifs_dbg(VFS, "close cached dir rc %d\n", rc);
} }
free_cached_dir(cfid); free_cached_dir(cfid);
......
...@@ -1077,6 +1077,7 @@ struct cifs_ses { ...@@ -1077,6 +1077,7 @@ struct cifs_ses {
and after mount option parsing we fill it */ and after mount option parsing we fill it */
char *domainName; char *domainName;
char *password; char *password;
char *password2; /* When key rotation used, new password may be set before it expires */
char workstation_name[CIFS_MAX_WORKSTATION_LEN]; char workstation_name[CIFS_MAX_WORKSTATION_LEN];
struct session_key auth_key; struct session_key auth_key;
struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */ struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */
......
...@@ -2183,6 +2183,7 @@ cifs_set_cifscreds(struct smb3_fs_context *ctx, struct cifs_ses *ses) ...@@ -2183,6 +2183,7 @@ cifs_set_cifscreds(struct smb3_fs_context *ctx, struct cifs_ses *ses)
} }
++delim; ++delim;
/* BB consider adding support for password2 (Key Rotation) for multiuser in future */
ctx->password = kstrndup(delim, len, GFP_KERNEL); ctx->password = kstrndup(delim, len, GFP_KERNEL);
if (!ctx->password) { if (!ctx->password) {
cifs_dbg(FYI, "Unable to allocate %zd bytes for password\n", cifs_dbg(FYI, "Unable to allocate %zd bytes for password\n",
...@@ -2206,6 +2207,7 @@ cifs_set_cifscreds(struct smb3_fs_context *ctx, struct cifs_ses *ses) ...@@ -2206,6 +2207,7 @@ cifs_set_cifscreds(struct smb3_fs_context *ctx, struct cifs_ses *ses)
kfree(ctx->username); kfree(ctx->username);
ctx->username = NULL; ctx->username = NULL;
kfree_sensitive(ctx->password); kfree_sensitive(ctx->password);
/* no need to free ctx->password2 since not allocated in this path */
ctx->password = NULL; ctx->password = NULL;
goto out_key_put; goto out_key_put;
} }
...@@ -2317,6 +2319,12 @@ cifs_get_smb_ses(struct TCP_Server_Info *server, struct smb3_fs_context *ctx) ...@@ -2317,6 +2319,12 @@ cifs_get_smb_ses(struct TCP_Server_Info *server, struct smb3_fs_context *ctx)
if (!ses->password) if (!ses->password)
goto get_ses_fail; goto get_ses_fail;
} }
/* ctx->password freed at unmount */
if (ctx->password2) {
ses->password2 = kstrdup(ctx->password2, GFP_KERNEL);
if (!ses->password2)
goto get_ses_fail;
}
if (ctx->domainname) { if (ctx->domainname) {
ses->domainName = kstrdup(ctx->domainname, GFP_KERNEL); ses->domainName = kstrdup(ctx->domainname, GFP_KERNEL);
if (!ses->domainName) if (!ses->domainName)
......
...@@ -162,6 +162,7 @@ const struct fs_parameter_spec smb3_fs_parameters[] = { ...@@ -162,6 +162,7 @@ const struct fs_parameter_spec smb3_fs_parameters[] = {
fsparam_string("username", Opt_user), fsparam_string("username", Opt_user),
fsparam_string("pass", Opt_pass), fsparam_string("pass", Opt_pass),
fsparam_string("password", Opt_pass), fsparam_string("password", Opt_pass),
fsparam_string("password2", Opt_pass2),
fsparam_string("ip", Opt_ip), fsparam_string("ip", Opt_ip),
fsparam_string("addr", Opt_ip), fsparam_string("addr", Opt_ip),
fsparam_string("domain", Opt_domain), fsparam_string("domain", Opt_domain),
...@@ -345,6 +346,7 @@ smb3_fs_context_dup(struct smb3_fs_context *new_ctx, struct smb3_fs_context *ctx ...@@ -345,6 +346,7 @@ smb3_fs_context_dup(struct smb3_fs_context *new_ctx, struct smb3_fs_context *ctx
new_ctx->nodename = NULL; new_ctx->nodename = NULL;
new_ctx->username = NULL; new_ctx->username = NULL;
new_ctx->password = NULL; new_ctx->password = NULL;
new_ctx->password2 = NULL;
new_ctx->server_hostname = NULL; new_ctx->server_hostname = NULL;
new_ctx->domainname = NULL; new_ctx->domainname = NULL;
new_ctx->UNC = NULL; new_ctx->UNC = NULL;
...@@ -357,6 +359,7 @@ smb3_fs_context_dup(struct smb3_fs_context *new_ctx, struct smb3_fs_context *ctx ...@@ -357,6 +359,7 @@ smb3_fs_context_dup(struct smb3_fs_context *new_ctx, struct smb3_fs_context *ctx
DUP_CTX_STR(prepath); DUP_CTX_STR(prepath);
DUP_CTX_STR(username); DUP_CTX_STR(username);
DUP_CTX_STR(password); DUP_CTX_STR(password);
DUP_CTX_STR(password2);
DUP_CTX_STR(server_hostname); DUP_CTX_STR(server_hostname);
DUP_CTX_STR(UNC); DUP_CTX_STR(UNC);
DUP_CTX_STR(source); DUP_CTX_STR(source);
...@@ -905,6 +908,8 @@ static int smb3_reconfigure(struct fs_context *fc) ...@@ -905,6 +908,8 @@ static int smb3_reconfigure(struct fs_context *fc)
else { else {
kfree_sensitive(ses->password); kfree_sensitive(ses->password);
ses->password = kstrdup(ctx->password, GFP_KERNEL); ses->password = kstrdup(ctx->password, GFP_KERNEL);
kfree_sensitive(ses->password2);
ses->password2 = kstrdup(ctx->password2, GFP_KERNEL);
} }
STEAL_STRING(cifs_sb, ctx, domainname); STEAL_STRING(cifs_sb, ctx, domainname);
STEAL_STRING(cifs_sb, ctx, nodename); STEAL_STRING(cifs_sb, ctx, nodename);
...@@ -1305,6 +1310,18 @@ static int smb3_fs_context_parse_param(struct fs_context *fc, ...@@ -1305,6 +1310,18 @@ static int smb3_fs_context_parse_param(struct fs_context *fc,
goto cifs_parse_mount_err; goto cifs_parse_mount_err;
} }
break; break;
case Opt_pass2:
kfree_sensitive(ctx->password2);
ctx->password2 = NULL;
if (strlen(param->string) == 0)
break;
ctx->password2 = kstrdup(param->string, GFP_KERNEL);
if (ctx->password2 == NULL) {
cifs_errorf(fc, "OOM when copying password2 string\n");
goto cifs_parse_mount_err;
}
break;
case Opt_ip: case Opt_ip:
if (strlen(param->string) == 0) { if (strlen(param->string) == 0) {
ctx->got_ip = false; ctx->got_ip = false;
...@@ -1608,6 +1625,8 @@ static int smb3_fs_context_parse_param(struct fs_context *fc, ...@@ -1608,6 +1625,8 @@ static int smb3_fs_context_parse_param(struct fs_context *fc,
cifs_parse_mount_err: cifs_parse_mount_err:
kfree_sensitive(ctx->password); kfree_sensitive(ctx->password);
ctx->password = NULL; ctx->password = NULL;
kfree_sensitive(ctx->password2);
ctx->password2 = NULL;
return -EINVAL; return -EINVAL;
} }
...@@ -1713,6 +1732,8 @@ smb3_cleanup_fs_context_contents(struct smb3_fs_context *ctx) ...@@ -1713,6 +1732,8 @@ smb3_cleanup_fs_context_contents(struct smb3_fs_context *ctx)
ctx->username = NULL; ctx->username = NULL;
kfree_sensitive(ctx->password); kfree_sensitive(ctx->password);
ctx->password = NULL; ctx->password = NULL;
kfree_sensitive(ctx->password2);
ctx->password2 = NULL;
kfree(ctx->server_hostname); kfree(ctx->server_hostname);
ctx->server_hostname = NULL; ctx->server_hostname = NULL;
kfree(ctx->UNC); kfree(ctx->UNC);
......
...@@ -145,6 +145,7 @@ enum cifs_param { ...@@ -145,6 +145,7 @@ enum cifs_param {
Opt_source, Opt_source,
Opt_user, Opt_user,
Opt_pass, Opt_pass,
Opt_pass2,
Opt_ip, Opt_ip,
Opt_domain, Opt_domain,
Opt_srcaddr, Opt_srcaddr,
...@@ -177,6 +178,7 @@ struct smb3_fs_context { ...@@ -177,6 +178,7 @@ struct smb3_fs_context {
char *username; char *username;
char *password; char *password;
char *password2;
char *domainname; char *domainname;
char *source; char *source;
char *server_hostname; char *server_hostname;
......
...@@ -1105,7 +1105,8 @@ static int cifs_get_fattr(struct cifs_open_info_data *data, ...@@ -1105,7 +1105,8 @@ static int cifs_get_fattr(struct cifs_open_info_data *data,
} else { } else {
cifs_open_info_to_fattr(fattr, data, sb); cifs_open_info_to_fattr(fattr, data, sb);
} }
if (!rc && fattr->cf_flags & CIFS_FATTR_DELETE_PENDING) if (!rc && *inode &&
(fattr->cf_flags & CIFS_FATTR_DELETE_PENDING))
cifs_mark_open_handles_for_deleted_file(*inode, full_path); cifs_mark_open_handles_for_deleted_file(*inode, full_path);
break; break;
case -EREMOTE: case -EREMOTE:
......
...@@ -98,6 +98,7 @@ sesInfoFree(struct cifs_ses *buf_to_free) ...@@ -98,6 +98,7 @@ sesInfoFree(struct cifs_ses *buf_to_free)
kfree(buf_to_free->serverDomain); kfree(buf_to_free->serverDomain);
kfree(buf_to_free->serverNOS); kfree(buf_to_free->serverNOS);
kfree_sensitive(buf_to_free->password); kfree_sensitive(buf_to_free->password);
kfree_sensitive(buf_to_free->password2);
kfree(buf_to_free->user_name); kfree(buf_to_free->user_name);
kfree(buf_to_free->domainName); kfree(buf_to_free->domainName);
kfree_sensitive(buf_to_free->auth_key.response); kfree_sensitive(buf_to_free->auth_key.response);
......
...@@ -4964,68 +4964,84 @@ static int smb2_next_header(struct TCP_Server_Info *server, char *buf, ...@@ -4964,68 +4964,84 @@ static int smb2_next_header(struct TCP_Server_Info *server, char *buf,
return 0; return 0;
} }
int cifs_sfu_make_node(unsigned int xid, struct inode *inode, static int __cifs_sfu_make_node(unsigned int xid, struct inode *inode,
struct dentry *dentry, struct cifs_tcon *tcon, struct dentry *dentry, struct cifs_tcon *tcon,
const char *full_path, umode_t mode, dev_t dev) const char *full_path, umode_t mode, dev_t dev)
{ {
struct cifs_open_info_data buf = {};
struct TCP_Server_Info *server = tcon->ses->server; struct TCP_Server_Info *server = tcon->ses->server;
struct cifs_open_parms oparms; struct cifs_open_parms oparms;
struct cifs_io_parms io_parms = {}; struct cifs_io_parms io_parms = {};
struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb); struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
struct cifs_fid fid; struct cifs_fid fid;
unsigned int bytes_written; unsigned int bytes_written;
struct win_dev *pdev; struct win_dev pdev = {};
struct kvec iov[2]; struct kvec iov[2];
__u32 oplock = server->oplocks ? REQ_OPLOCK : 0; __u32 oplock = server->oplocks ? REQ_OPLOCK : 0;
int rc; int rc;
if (!S_ISCHR(mode) && !S_ISBLK(mode) && !S_ISFIFO(mode)) switch (mode & S_IFMT) {
case S_IFCHR:
strscpy(pdev.type, "IntxCHR");
pdev.major = cpu_to_le64(MAJOR(dev));
pdev.minor = cpu_to_le64(MINOR(dev));
break;
case S_IFBLK:
strscpy(pdev.type, "IntxBLK");
pdev.major = cpu_to_le64(MAJOR(dev));
pdev.minor = cpu_to_le64(MINOR(dev));
break;
case S_IFIFO:
strscpy(pdev.type, "LnxFIFO");
break;
default:
return -EPERM; return -EPERM;
}
oparms = (struct cifs_open_parms) { oparms = CIFS_OPARMS(cifs_sb, tcon, full_path, GENERIC_WRITE,
.tcon = tcon, FILE_CREATE, CREATE_NOT_DIR |
.cifs_sb = cifs_sb, CREATE_OPTION_SPECIAL, ACL_NO_MODE);
.desired_access = GENERIC_WRITE, oparms.fid = &fid;
.create_options = cifs_create_options(cifs_sb, CREATE_NOT_DIR |
CREATE_OPTION_SPECIAL),
.disposition = FILE_CREATE,
.path = full_path,
.fid = &fid,
};
rc = server->ops->open(xid, &oparms, &oplock, &buf); rc = server->ops->open(xid, &oparms, &oplock, NULL);
if (rc) if (rc)
return rc; return rc;
/*
* BB Do not bother to decode buf since no local inode yet to put
* timestamps in, but we can reuse it safely.
*/
pdev = (struct win_dev *)&buf.fi;
io_parms.pid = current->tgid; io_parms.pid = current->tgid;
io_parms.tcon = tcon; io_parms.tcon = tcon;
io_parms.length = sizeof(*pdev); io_parms.length = sizeof(pdev);
iov[1].iov_base = pdev; iov[1].iov_base = &pdev;
iov[1].iov_len = sizeof(*pdev); iov[1].iov_len = sizeof(pdev);
if (S_ISCHR(mode)) {
memcpy(pdev->type, "IntxCHR", 8);
pdev->major = cpu_to_le64(MAJOR(dev));
pdev->minor = cpu_to_le64(MINOR(dev));
} else if (S_ISBLK(mode)) {
memcpy(pdev->type, "IntxBLK", 8);
pdev->major = cpu_to_le64(MAJOR(dev));
pdev->minor = cpu_to_le64(MINOR(dev));
} else if (S_ISFIFO(mode)) {
memcpy(pdev->type, "LnxFIFO", 8);
}
rc = server->ops->sync_write(xid, &fid, &io_parms, rc = server->ops->sync_write(xid, &fid, &io_parms,
&bytes_written, iov, 1); &bytes_written, iov, 1);
server->ops->close(xid, tcon, &fid); server->ops->close(xid, tcon, &fid);
d_drop(dentry); return rc;
/* FIXME: add code here to set EAs */ }
cifs_free_open_info(&buf);
int cifs_sfu_make_node(unsigned int xid, struct inode *inode,
struct dentry *dentry, struct cifs_tcon *tcon,
const char *full_path, umode_t mode, dev_t dev)
{
struct inode *new = NULL;
int rc;
rc = __cifs_sfu_make_node(xid, inode, dentry, tcon,
full_path, mode, dev);
if (rc)
return rc;
if (tcon->posix_extensions) {
rc = smb311_posix_get_inode_info(&new, full_path, NULL,
inode->i_sb, xid);
} else if (tcon->unix_ext) {
rc = cifs_get_inode_info_unix(&new, full_path,
inode->i_sb, xid);
} else {
rc = cifs_get_inode_info(&new, full_path, NULL,
inode->i_sb, xid, NULL);
}
if (!rc)
d_instantiate(dentry, new);
return rc; return rc;
} }
......
...@@ -367,6 +367,17 @@ smb2_reconnect(__le16 smb2_command, struct cifs_tcon *tcon, ...@@ -367,6 +367,17 @@ smb2_reconnect(__le16 smb2_command, struct cifs_tcon *tcon,
} }
rc = cifs_setup_session(0, ses, server, nls_codepage); rc = cifs_setup_session(0, ses, server, nls_codepage);
if ((rc == -EACCES) || (rc == -EKEYEXPIRED) || (rc == -EKEYREVOKED)) {
/*
* Try alternate password for next reconnect (key rotation
* could be enabled on the server e.g.) if an alternate
* password is available and the current password is expired,
* but do not swap on non pwd related errors like host down
*/
if (ses->password2)
swap(ses->password2, ses->password);
}
if ((rc == -EACCES) && !tcon->retry) { if ((rc == -EACCES) && !tcon->retry) {
mutex_unlock(&ses->session_mutex); mutex_unlock(&ses->session_mutex);
rc = -EHOSTDOWN; rc = -EHOSTDOWN;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment