1. 21 Aug, 2021 1 commit
  2. 20 Aug, 2021 1 commit
  3. 17 Aug, 2021 1 commit
  4. 12 Aug, 2021 7 commits
    • Namjae Jeon's avatar
      ksmbd: update SMB3 multi-channel support in ksmbd.rst · 668fff01
      Namjae Jeon authored
      ksmbd start supporting SMB3 Multi-channel feature. Mark it as Partially
      supported till replay/retry mechanisms are implemented.
      Signed-off-by: default avatarNamjae Jeon <namjae.jeon@samsung.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      668fff01
    • Hyunchul Lee's avatar
      ksmbd: smbd: fix kernel oops during server shutdown · 323b1ea1
      Hyunchul Lee authored
      if server shutdown happens in the situation that
      there are connections, workqueue could be destroyed
      before queueing disconnect work.
      Signed-off-by: default avatarHyunchul Lee <hyc.lee@gmail.com>
      Signed-off-by: default avatarNamjae Jeon <namjae.jeon@samsung.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      323b1ea1
    • Namjae Jeon's avatar
      ksmbd: remove select FS_POSIX_ACL in Kconfig · 777cad16
      Namjae Jeon authored
      ksmbd is forcing to turn on FS_POSIX_ACL in Kconfig to use vfs acl
      functions(posix_acl_alloc, get_acl, set_posix_acl). OpenWRT and other
      platform doesn't use acl and this config is disable by default in
      kernel. This patch use IS_ENABLED() to know acl config is enable and use
      acl function if it is enable.
      Signed-off-by: default avatarNamjae Jeon <namjae.jeon@samsung.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      777cad16
    • Namjae Jeon's avatar
      ksmbd: use proper errno instead of -1 in smb2_get_ksmbd_tcon() · c6ce2b57
      Namjae Jeon authored
      Use proper errno instead of -1 in smb2_get_ksmbd_tcon().
      Signed-off-by: default avatarNamjae Jeon <namjae.jeon@samsung.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      c6ce2b57
    • Namjae Jeon's avatar
      ksmbd: update the comment for smb2_get_ksmbd_tcon() · 5ec3df8e
      Namjae Jeon authored
      Update the comment for smb2_get_ksmbd_tcon().
      Signed-off-by: default avatarNamjae Jeon <namjae.jeon@samsung.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      5ec3df8e
    • Namjae Jeon's avatar
      ksmbd: change int data type to boolean · f4228b67
      Namjae Jeon authored
      Change data type of function that return only 0 or 1 to boolean.
      Signed-off-by: default avatarNamjae Jeon <namjae.jeon@samsung.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      f4228b67
    • Marios Makassikis's avatar
      ksmbd: Fix multi-protocol negotiation · eebff916
      Marios Makassikis authored
      To negotiate either the SMB2 protocol or SMB protocol, a client must
      send a SMB_COM_NEGOTIATE message containing the list of dialects it
      supports, to which the server will respond with either a
      SMB_COM_NEGOTIATE or a SMB2_NEGOTIATE response.
      
      The current implementation responds with the highest common dialect,
      rather than looking explicitly for "SMB 2.???" and "SMB 2.002", as
      indicated in [MS-SMB2]:
      
        [MS-SMB2] 3.3.5.3.1:
          If the server does not implement the SMB 2.1 or 3.x dialect family,
          processing MUST continue as specified in 3.3.5.3.2.
      
          Otherwise, the server MUST scan the dialects provided for the dialect
          string "SMB 2.???". If the string is not present, continue to section
          3.3.5.3.2. If the string is present, the server MUST respond with an
          SMB2 NEGOTIATE Response as specified in 2.2.4.
      
        [MS-SMB2] 3.3.5.3.2:
          The server MUST scan the dialects provided for the dialect string "SMB
          2.002". If the string is present, the client understands SMB2, and the
          server MUST respond with an SMB2 NEGOTIATE Response.
      
      This is an issue if a client attempts to negotiate SMB3.1.1 using
      a SMB_COM_NEGOTIATE, as it will trigger the following NULL pointer
      dereference:
      
        8<--- cut here ---
        Unable to handle kernel NULL pointer dereference at virtual address 00000000
        pgd = 1917455e
        [00000000] *pgd=00000000
        Internal error: Oops: 17 [#1] ARM
        CPU: 0 PID: 60 Comm: kworker/0:1 Not tainted 5.4.60-00027-g0518c02b5c5b #35
        Hardware name: Marvell Kirkwood (Flattened Device Tree)
        Workqueue: ksmbd-io handle_ksmbd_work
        PC is at ksmbd_gen_preauth_integrity_hash+0x24/0x190
        LR is at smb3_preauth_hash_rsp+0x50/0xa0
        pc : [<802b7044>] lr : [<802d6ac0>] psr: 40000013
        sp : bf199ed8 ip : 00000000 fp : 80d1edb0
        r10: 80a3471b r9 : 8091af16 r8 : 80d70640
        r7 : 00000072 r6 : be95e198 r5 : ca000000 r4 : b97fee00
        r3 : 00000000 r2 : 00000002 r1 : b97fea00 r0 : b97fee00
        Flags: nZcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
        Control: 0005317f Table: 3e7f4000 DAC: 00000055
        Process kworker/0:1 (pid: 60, stack limit = 0x3dd1fdb4)
        Stack: (0xbf199ed8 to 0xbf19a000)
        9ec0: b97fee00 00000000
        9ee0: be95e198 00000072 80d70640 802d6ac0 b3da2680 b97fea00 424d53ff be95e140
        9f00: b97fee00 802bd7b0 bf10fa58 80128a78 00000000 000001c8 b6220000 bf0b7720
        9f20: be95e198 80d0c410 bf7e2a00 00000000 00000000 be95e19c 80d0c370 80123b90
        9f40: bf0b7720 be95e198 bf0b7720 bf0b7734 80d0c410 bf198000 80d0c424 80d116e0
        9f60: bf10fa58 801240c0 00000000 bf10fa40 bf1463a0 bf198000 bf0b7720 80123ed0
        9f80: bf077ee4 bf10fa58 00000000 80127f80 bf1463a0 80127e88 00000000 00000000
        9fa0: 00000000 00000000 00000000 801010d0 00000000 00000000 00000000 00000000
        9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
        9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
        [<802b7044>] (ksmbd_gen_preauth_integrity_hash) from [<802d6ac0>] (smb3_preauth_hash_rsp+0x50/0xa0)
        [<802d6ac0>] (smb3_preauth_hash_rsp) from [<802bd7b0>] (handle_ksmbd_work+0x348/0x3f8)
        [<802bd7b0>] (handle_ksmbd_work) from [<80123b90>] (process_one_work+0x160/0x200)
        [<80123b90>] (process_one_work) from [<801240c0>] (worker_thread+0x1f0/0x2e4)
        [<801240c0>] (worker_thread) from [<80127f80>] (kthread+0xf8/0x10c)
        [<80127f80>] (kthread) from [<801010d0>] (ret_from_fork+0x14/0x24)
        Exception stack(0xbf199fb0 to 0xbf199ff8)
        9fa0: 00000000 00000000 00000000 00000000
        9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
        9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
        Code: e1855803 e5d13003 e1855c03 e5903094 (e1d330b0)
        ---[ end trace 8d03be3ed09e5699 ]---
        Kernel panic - not syncing: Fatal exception
      
      smb3_preauth_hash_rsp() panics because conn->preauth_info is only allocated
      when processing a SMB2 NEGOTIATE request.
      
      Fix this by splitting the smb_protos array into two, each containing
      only SMB1 and SMB2 dialects respectively.
      
      While here, make ksmbd_negotiate_smb_dialect() static as it not
      called from anywhere else.
      Signed-off-by: default avatarMarios Makassikis <mmakassikis@freebox.fr>
      Signed-off-by: default avatarNamjae Jeon <namjae.jeon@samsung.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      eebff916
  5. 01 Aug, 2021 1 commit
  6. 27 Jul, 2021 5 commits
  7. 23 Jul, 2021 2 commits
  8. 22 Jul, 2021 3 commits
  9. 19 Jul, 2021 4 commits
  10. 15 Jul, 2021 1 commit
  11. 13 Jul, 2021 5 commits
  12. 10 Jul, 2021 7 commits
  13. 08 Jul, 2021 2 commits