Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4809865yba; Tue, 30 Apr 2019 04:53:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqyjktONBvw/KVWOgZppcjA5UPWee5AHuhxDEo3be6iSYFjdOOUBIBMMztEnzv2vjYxyJfpC X-Received: by 2002:a17:902:bc81:: with SMTP id bb1mr14505471plb.330.1556625188663; Tue, 30 Apr 2019 04:53:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556625188; cv=none; d=google.com; s=arc-20160816; b=Vge5H4uxeAlsN1Kai4f/r3BDyeeHCMocLtsqI5v1t7u/Zu/2ojwZb+CrJrWkFWzDZR 4OQLtdQWrbZyrrCvAvLLOP8qMKbiNN/FhOe7J0SeVD854oVd9+Fmdea0xpk771mHTbBE UWqFb3KwrppzhVHZHeP7LnO62RcpIXdi+KPQEvhsZqNrL75NTGgeBTPuzMxD997EyNLK LhdO3ZK0AdKVFLPO0PFlvl5YB69N4b5RnaBEfoyJ5I+ksd+ZKug63EEeD//WXEHC1d63 zIQY3whIIHoY6nwXg5p7b2GRyACdzGXV1fv7x564clMqqDohJegbEB1EY6VbPBIPR/Xa WOQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=DLKjUDEht9Icc9xtBYZgSDpdkV+pi+07mKyaslRwhSY=; b=unvVmYIKlfzLeeTBtuE33Y9cE58oK8STOfucLvUiIRiEsYdoQQZSEvc4CBCFGQ9KDp WG1d5b3ZRtSaiAgXk6WCe/5GXf2hxsArv54aPR78pB+2tKzCNboAHn1wTvDL1crFmObm pUx/fNG+V1QIBOJYrNe1Cnan0xfBiOgrBFqzEFYxEPC6SF/KA3RIJprFyA+Jnmv7Tgbd CBsPWX3ewCKD18x0thbySY7OSWhQEhEWrw4Vy9rdoCl0ZZExkWBWTphO2jkKzYYuGCpI xj2ssh6uJuMKYmQc+4sZDt8Yxp6kJmWpDJkyivC72KTK+MXHOu21W2sele/9qmBmvR6o EIPQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=F9h98rSd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i9si11554631pgs.402.2019.04.30.04.52.52; Tue, 30 Apr 2019 04:53:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=F9h98rSd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731137AbfD3LuG (ORCPT + 99 others); Tue, 30 Apr 2019 07:50:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:36910 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731122AbfD3LuE (ORCPT ); Tue, 30 Apr 2019 07:50:04 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DA8F321783; Tue, 30 Apr 2019 11:50:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556625004; bh=mhXp3yi9SmczJXGFbcmNB5kdXerbdBiyCIswjE75ejQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=F9h98rSdhmeQY0BvmWKuk67mxnt7VmaH8bWP7cM+Z2Ue19DR7JGrBp9LPQTqg3COb pUQTHAhH4b/zlsyuZOMkOOKzrL4wVe7LTa05h9IlrlWvFFo0ngFcT7VXQMXzimpNRt nL5U92b81iLhEYtJuwuqBMvKliKV5HXuysmg/HN8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Frank Sorenson , Steve French , Ronnie Sahlberg Subject: [PATCH 5.0 10/89] cifs: do not attempt cifs operation on smb2+ rename error Date: Tue, 30 Apr 2019 13:38:01 +0200 Message-Id: <20190430113610.231633947@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190430113609.741196396@linuxfoundation.org> References: <20190430113609.741196396@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Frank Sorenson commit 652727bbe1b17993636346716ae5867627793647 upstream. A path-based rename returning EBUSY will incorrectly try opening the file with a cifs (NT Create AndX) operation on an smb2+ mount, which causes the server to force a session close. If the mount is smb2+, skip the fallback. Signed-off-by: Frank Sorenson Signed-off-by: Steve French CC: Stable Reviewed-by: Ronnie Sahlberg Signed-off-by: Greg Kroah-Hartman --- fs/cifs/inode.c | 4 ++++ 1 file changed, 4 insertions(+) --- a/fs/cifs/inode.c +++ b/fs/cifs/inode.c @@ -1735,6 +1735,10 @@ cifs_do_rename(const unsigned int xid, s if (rc == 0 || rc != -EBUSY) goto do_rename_exit; + /* Don't fall back to using SMB on SMB 2+ mount */ + if (server->vals->protocol_id != 0) + goto do_rename_exit; + /* open-file renames don't work across directories */ if (to_dentry->d_parent != from_dentry->d_parent) goto do_rename_exit;