Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp3963976img; Mon, 25 Mar 2019 23:39:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqwkQHjtQa4fVs1fr0oagVmzfgwvCn8lKhczKZaOPle3nuE7NaVtF5WpBkH/4KSdkETL5i6U X-Received: by 2002:a62:5789:: with SMTP id i9mr27385883pfj.75.1553582373440; Mon, 25 Mar 2019 23:39:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553582373; cv=none; d=google.com; s=arc-20160816; b=b3NiUqd4/3iJIjkFul0k5VXdZ62mOI25e1qSYpSyBUtqpJX+o8tFCxehz5x5IwuWB+ T/ZgZT3vCRm40RCdtxXPkcpUH0JSm6ls6sI+hbmTK2tUZ14PyvssqsOKLZDOExrASuSt PGOyglTC8UwrLif3vWZYsgR+Tlk4g3KK4LdWawdoEm+9TfejsYc3NPutQuGVIKWTjXM/ afVyEwWq5bYXauUX7YTFMlzDpqbXybjS6tPvstQCZNfXG2qxeXD1JImyLuS8un+4vliW Vua/fyn5WgUTmdz8CVjBRy6Ykqi6IjLoY71n8tP2qchbRBBjTnX1NRRYAiPcJ1m20yP3 7iBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=q0DULjVz4RbZXdx7P4TW8cwp9emHSJSYypu07B1MZuI=; b=D2aOSdYUYyJAL8cNHmqbgMXtozQvxPr9tpIZsYmGJRozUm0yR42S0MJAEDfR0d6FgQ HT3/QjFyE8Hpbky9DZsOyTKeJuO0O/7xrrUw0GvASMxUNpgpreHfazBEvBPLnie9ZYAI bTh+CUmt/4/XqK8Lb29tPzoDQBmt8XahVpZ/u+aexZW0p44vTpd/y92Fyp94S7NHJa8y K6qXClwxUcuRcGXffXU+oPuJcUbsN8yAzcLjgh/iSmMmbuu9oGK0rMRJAidnuHDL7GYL u/pm9tIudiDb54oBQILn11kbDU0MF6UfYHI5VVBKV8ju2UdMnULsMfr5hVw9PR1Ht4hI DiZQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="Ipwt/fOE"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f1si16035972pld.32.2019.03.25.23.39.18; Mon, 25 Mar 2019 23:39:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="Ipwt/fOE"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732324AbfCZGhG (ORCPT + 99 others); Tue, 26 Mar 2019 02:37:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:50062 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731566AbfCZGhC (ORCPT ); Tue, 26 Mar 2019 02:37:02 -0400 Received: from localhost (unknown [104.132.152.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AE0F820870; Tue, 26 Mar 2019 06:37:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553582222; bh=K+tU5aGs6ys5FGhLzT+Jv6erw/YkO3s+HpsoCTFTJDk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Ipwt/fOEAns/FbINlACwpmMGfb+0go5Kl99PewSKzvGYvaacyJf0+BFflhfze2HQp a1S37ZZueLb5ByjJUtcxdNsm6trEGqrR5paj4peg/CY0KyayfF8ybtQfkj8NXvTBn7 iGaFSRgQW5ZidpljRoMmlAVd0AWIXxB80yreO1zk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ronnie Sahlberg , Steve French Subject: [PATCH 4.19 18/45] cifs: allow guest mounts to work for smb3.11 Date: Tue, 26 Mar 2019 15:30:01 +0900 Message-Id: <20190326042703.652507481@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190326042702.565683325@linuxfoundation.org> References: <20190326042702.565683325@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Ronnie Sahlberg commit e71ab2aa06f731a944993120b0eef1556c63b81c upstream. Fix Guest/Anonymous sessions so that they work with SMB 3.11. The commit noted below tightened the conditions and forced signing for the SMB2-TreeConnect commands as per MS-SMB2. However, this should only apply to normal user sessions and not for Guest/Anonumous sessions. Fixes: 6188f28bf608 ("Tree connect for SMB3.1.1 must be signed for non-encrypted shares") Signed-off-by: Ronnie Sahlberg CC: Stable Signed-off-by: Steve French Signed-off-by: Greg Kroah-Hartman --- fs/cifs/smb2pdu.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) --- a/fs/cifs/smb2pdu.c +++ b/fs/cifs/smb2pdu.c @@ -1500,9 +1500,13 @@ SMB2_tcon(const unsigned int xid, struct iov[1].iov_base = unc_path; iov[1].iov_len = unc_path_len; - /* 3.11 tcon req must be signed if not encrypted. See MS-SMB2 3.2.4.1.1 */ + /* + * 3.11 tcon req must be signed if not encrypted. See MS-SMB2 3.2.4.1.1 + * unless it is guest or anonymous user. See MS-SMB2 3.2.5.3.1 + */ if ((ses->server->dialect == SMB311_PROT_ID) && - !smb3_encryption_required(tcon)) + !smb3_encryption_required(tcon) && + !(ses->session_flags & (SMB2_SESSION_FLAG_IS_GUEST|SMB2_SESSION_FLAG_IS_NULL))) req->sync_hdr.Flags |= SMB2_FLAGS_SIGNED; memset(&rqst, 0, sizeof(struct smb_rqst));