Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp3939540imm; Mon, 8 Oct 2018 12:01:42 -0700 (PDT) X-Google-Smtp-Source: ACcGV61Fwi1VqCNit4diYQ3ngS59c6zmr71Ti3pKN8rZHyzyhvldu6yNidE9z0VO5ta2um3ElkxE X-Received: by 2002:a63:6111:: with SMTP id v17-v6mr22032390pgb.226.1539025302314; Mon, 08 Oct 2018 12:01:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539025302; cv=none; d=google.com; s=arc-20160816; b=aJm92Ks8enw+CCDz9PS74l79XKS53Pjo449Szk/JcNOE8r8MgeQQewc1TvIqf8bxW7 x4id2zFekdpgiWskVVQaYOXOYxlsvMEptH6sNYy0l/xA84H34lJFEZp/vqQ3KObifXok Ddicrk29ahUGGoAuKX2rCrS86GjCgMDsVymtuvZrpEhCH/3httpAQqauy30MXAvm79ps zy08Kpvpy3vCak4Y7fm7gO390d+gU/tALBMXAaDDvj5CZE2CDEbYMY4aCKFeWYSUDqsW As78QSC5SbPF302lJjvU49XoT1vy0oIppk/VpVSIbcIsWuS7ijelsV/IjVR5+DL/lACE wXBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=yBZh63FSaE5SXIU0AdEY8BbpynujHTdGG9ZR/bJ67Ek=; b=wLgxX66A/K4pGqRPZ55JWaL0tCZC5oGC4EEt3yF51QXipEG92llLCKcZeVwrA4ERd8 JMS/skkJaOr1vu47UGArWwcR8ZAoXMp6Ag1zF8AjzeABkgJHW2HQ7vig69I81IFTI2mq NBLvEui5oX/kcyiYegUf45hXrETaRn7/SnfFR+A4TSmnNMnj7TdXYO20deZTX9+j2e5K P5eGRR0zbeI6tBh1Pgefqy5qvf4FK3i5BpTTyKUd11wVspFuBtRvU0SPQTTdH3Kf2Une 8CEAcB5eIZHASWJa4sJRjrHLMb8SQWhKTqpGw0Ik5WS//p4kPdLFaS9Ltfm6mJBs+P5u CO9g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Z2zvqPxp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 11-v6si17973849plb.383.2018.10.08.12.01.26; Mon, 08 Oct 2018 12:01:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Z2zvqPxp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731607AbeJICBR (ORCPT + 99 others); Mon, 8 Oct 2018 22:01:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:50240 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728239AbeJICBQ (ORCPT ); Mon, 8 Oct 2018 22:01:16 -0400 Received: from localhost (ip-213-127-77-176.ip.prioritytelecom.net [213.127.77.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8DA092087D; Mon, 8 Oct 2018 18:48:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1539024490; bh=796PhFeY4YM3cwhY6kduwQKJgGVWsXJniUsLZ7qg9ig=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Z2zvqPxp9pMLBnBxe26yfHunxvUCMoFuZW/U06VCvPdTixx3kMKdxxw89cOs6s3Oy hqK1aciW9BG5YrghPwosy5SLSNIt5bmjY+BTzhEJh6T16yhVluo6GnT+hIa+u5tSBr m4CBSP0Mc6lU3Ut2tB14ulAJi3/rXDBkshHtyoIM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jon Kuhn , Steve French , Sasha Levin Subject: [PATCH 4.18 056/168] fs/cifs: dont translate SFM_SLASH (U+F026) to backslash Date: Mon, 8 Oct 2018 20:30:36 +0200 Message-Id: <20181008175622.182247301@linuxfoundation.org> X-Mailer: git-send-email 2.19.0 In-Reply-To: <20181008175620.043587728@linuxfoundation.org> References: <20181008175620.043587728@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jon Kuhn [ Upstream commit c15e3f19a6d5c89b1209dc94b40e568177cb0921 ] When a Mac client saves an item containing a backslash to a file server the backslash is represented in the CIFS/SMB protocol as as U+F026. Before this change, listing a directory containing an item with a backslash in its name will return that item with the backslash represented with a true backslash character (U+005C) because convert_sfm_character mapped U+F026 to U+005C when interpretting the CIFS/SMB protocol response. However, attempting to open or stat the path using a true backslash will result in an error because convert_to_sfm_char does not map U+005C back to U+F026 causing the CIFS/SMB request to be made with the backslash represented as U+005C. This change simply prevents the U+F026 to U+005C conversion from happenning. This is analogous to how the code does not do any translation of UNI_SLASH (U+F000). Signed-off-by: Jon Kuhn Signed-off-by: Steve French Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- fs/cifs/cifs_unicode.c | 3 --- 1 file changed, 3 deletions(-) --- a/fs/cifs/cifs_unicode.c +++ b/fs/cifs/cifs_unicode.c @@ -105,9 +105,6 @@ convert_sfm_char(const __u16 src_char, c case SFM_LESSTHAN: *target = '<'; break; - case SFM_SLASH: - *target = '\\'; - break; case SFM_SPACE: *target = ' '; break;