Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4828139yba; Tue, 30 Apr 2019 05:09:39 -0700 (PDT) X-Google-Smtp-Source: APXvYqyQ9KJHYdxKiWOisvC4OVkmgmUd6uh+zgM1DrWQoUauYm3FN5Dp8ajQJTyq6Klzj9srXWss X-Received: by 2002:a63:df43:: with SMTP id h3mr66580100pgj.294.1556626179205; Tue, 30 Apr 2019 05:09:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556626179; cv=none; d=google.com; s=arc-20160816; b=ub12wA4XmfCu18mbJRM1egcM9YmVwYS1wCUOgTBdQgFAtHo64Dr3cLvfQFJJ7EF3BS 431SqKPD9EfqkF0KvZXt5IFNdAoNLSonafR/MMPECE0sIoLJSGEBV0Bgm29A6SMYcTTg giE1mGcphi9T81ne8MPnJxIpq2QtV8KWimWHE7VNE8OIk+KADL2M8ceMtmWZWH5YT4wz fMJw5GE8NWxpjAV2AqXDa4nRChmgtcKPLhiybniOeL1wAbbxWRG2Kk0+NCTv2+50JfAb 9NpGV6VVJFxHJ4jRmZierJ20S/kglxE0/SMy7hQPNRl4a50QPt1A72Dziyu7PwW46SK2 FWzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=HX2SLg3nyj92N8CIZZu5zJ0/gdibZsEyQ4nOiXrEFNk=; b=A6ZLk2fFsjt97G97pg7Kfhw/JoUpIuCoN82eXJ3E+1EjdbRdARqKfpOOesZ8QRmM5j ODU44QKSMwnJr7D3Hq1RuAJeQIDrTFZKAGW4k+c6gdJaDJNeuCUf0SQz8jzSn6pTL5GX HkMlJEEOF7Kej1fWrxgm2CPz1ZhNWud8uPPb6/iRUYbdiKuLbbkWU+dnDxskeRduuX2o 0kqXmQ+IMLbHPooB49oLKBJ7GRgphx3X40CwK3Q6u5nRJTO8WUxH0Ig6328msehdIAQp PH0mpFommjmTR3VeAmKUJaBjD2B3uoo0U5OZGpSZWNUkTZR32E0XQsgJitIpxg4kZ6yt KJlA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=I7QtcR5R; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id cb18si5033360plb.1.2019.04.30.05.09.22; Tue, 30 Apr 2019 05:09:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=I7QtcR5R; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728187AbfD3Lj7 (ORCPT + 99 others); Tue, 30 Apr 2019 07:39:59 -0400 Received: from mail.kernel.org ([198.145.29.99]:45732 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727380AbfD3Lj6 (ORCPT ); Tue, 30 Apr 2019 07:39:58 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5A03721734; Tue, 30 Apr 2019 11:39:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556624397; bh=/qjWqKHu3ZXP6yVjNlOP85MfxlesW2a+Jy4lSu2u2kA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=I7QtcR5RQwD085q6W2ZNHVdj7jzP9csMtNFuVAYVnF2mBzWlc0/82rkC9BBifzfzX zUO0OJVc3tW2OeN7B/r9YzHnTnYws66x8CoINLjkGc8CbJSVm50XfxLnbifWBx8FPn GMP9sGHY9dLBSxRcXpPJuRhHaT0VQG6hdLyDmnnM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Frank Sorenson , Steve French , Ronnie Sahlberg Subject: [PATCH 4.9 02/41] cifs: do not attempt cifs operation on smb2+ rename error Date: Tue, 30 Apr 2019 13:38:13 +0200 Message-Id: <20190430113524.880372121@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190430113524.451237916@linuxfoundation.org> References: <20190430113524.451237916@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Frank Sorenson commit 652727bbe1b17993636346716ae5867627793647 upstream. A path-based rename returning EBUSY will incorrectly try opening the file with a cifs (NT Create AndX) operation on an smb2+ mount, which causes the server to force a session close. If the mount is smb2+, skip the fallback. Signed-off-by: Frank Sorenson Signed-off-by: Steve French CC: Stable Reviewed-by: Ronnie Sahlberg Signed-off-by: Greg Kroah-Hartman --- fs/cifs/inode.c | 4 ++++ 1 file changed, 4 insertions(+) --- a/fs/cifs/inode.c +++ b/fs/cifs/inode.c @@ -1722,6 +1722,10 @@ cifs_do_rename(const unsigned int xid, s if (rc == 0 || rc != -EBUSY) goto do_rename_exit; + /* Don't fall back to using SMB on SMB 2+ mount */ + if (server->vals->protocol_id != 0) + goto do_rename_exit; + /* open-file renames don't work across directories */ if (to_dentry->d_parent != from_dentry->d_parent) goto do_rename_exit;