Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp3696966ybv; Mon, 10 Feb 2020 04:54:30 -0800 (PST) X-Google-Smtp-Source: APXvYqyBiT9KLzGLI+TaHgjG47XavC8kVR8AlNtsMz2peCi0o1bgeQ+ONIOjWVMnXMDkJvOhSiOj X-Received: by 2002:a9d:3bc4:: with SMTP id k62mr984146otc.186.1581339270362; Mon, 10 Feb 2020 04:54:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581339270; cv=none; d=google.com; s=arc-20160816; b=a0NW+2UjPSH4aP5/4Xo46i6my2/SNX/l3axChA322dYryqCQr61DlOVGRl1F0t4agg OIYEu+ZSfVs7P8lQ4hifFiqeqVIQUweYhKPVxoHzuLOxmEAioLvmDtEyqaE3PK5W8Y4I FblznrKyj5Op+uy6L0T7LPjyJbNfeQ93iM1f3QDcQOuPAxNkgi6g4r9TlbpgufFxZ08X Pl1O0rYlxUI6PH/WoZv2XRzfiV4jH863QhVpVkucOguygcwZxwBZ9UjqMBJt0rlkKj19 DDwAuSdgO4M6MIsmZo75DF81RZ+B4HpzfbXtHGZE2lFZuLMr+azW2tC3k1bLzMhThh1t crwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=HG+CISghDyVNDRaIc2M+3qeIZOiJKOOrQ3V0LpGaZco=; b=iHulAGXzUm1PLXJdkAiYZ8AnCld7h79Qc1D3TU2nJgw9O2tH4VphwMa+fpHilUZPPd dznVYKrfM1EvZVbZyOLUI6SKvW99CmJLap5TLbgiiWahO2kpdci0y3y3AmZr0HmsOO9g eJ7txYP6GOu4eq3jxByTXXtjFT7+8dcQJaxtOVB0wvI/bJ091EDr5EbvyJVk51G00pEs 8WWHA2yu3Vf+bM3TxWTz8wy5KDBoiQ2SBWpALSjCPTYz0hmN3bVdL77pc3vNIUT8Cpd0 smXFd4Rq06PDVpg9CMe10DTAXUK/GkNIdAmvQHcOB6m+P86SJQbC0cSkoNn2WbYXvpdC jcNw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=aO4hoW7s; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f4si143151oto.169.2020.02.10.04.54.19; Mon, 10 Feb 2020 04:54:30 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=aO4hoW7s; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729314AbgBJMxt (ORCPT + 99 others); Mon, 10 Feb 2020 07:53:49 -0500 Received: from mail.kernel.org ([198.145.29.99]:45726 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730151AbgBJMmG (ORCPT ); Mon, 10 Feb 2020 07:42:06 -0500 Received: from localhost (unknown [209.37.97.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 626CD20838; Mon, 10 Feb 2020 12:42:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1581338526; bh=OXiUvrVzIJ7XyIE+fQLd2qgJDI8aMUNySP+I27n7S5k=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=aO4hoW7s1Sma1Eq0ehjOD9jODyg1Mfjx3UkWFZ5+savilalftAQnlHJVXnKhfyIhP FocGLz2a1hYTpLzQnRvK7ywz6TxCrc8RWpsKcd4RgXsYpOAw5DNyc8IHh4+MBAZWoB lq+HvJz8L2eCQgfeolk74K4FSG83EYjP4tCrFh20= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ronnie Sahlberg , Steve French Subject: [PATCH 5.5 347/367] cifs: fail i/o on soft mounts if sessionsetup errors out Date: Mon, 10 Feb 2020 04:34:20 -0800 Message-Id: <20200210122454.595292547@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200210122423.695146547@linuxfoundation.org> References: <20200210122423.695146547@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ronnie Sahlberg commit b0dd940e582b6a60296b9847a54012a4b080dc72 upstream. RHBZ: 1579050 If we have a soft mount we should fail commands for session-setup failures (such as the password having changed/ account being deleted/ ...) and return an error back to the application. Signed-off-by: Ronnie Sahlberg Signed-off-by: Steve French CC: Stable Signed-off-by: Greg Kroah-Hartman --- fs/cifs/smb2pdu.c | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) --- a/fs/cifs/smb2pdu.c +++ b/fs/cifs/smb2pdu.c @@ -350,9 +350,14 @@ smb2_reconnect(__le16 smb2_command, stru } rc = cifs_negotiate_protocol(0, tcon->ses); - if (!rc && tcon->ses->need_reconnect) + if (!rc && tcon->ses->need_reconnect) { rc = cifs_setup_session(0, tcon->ses, nls_codepage); - + if ((rc == -EACCES) && !tcon->retry) { + rc = -EHOSTDOWN; + mutex_unlock(&tcon->ses->session_mutex); + goto failed; + } + } if (rc || !tcon->need_reconnect) { mutex_unlock(&tcon->ses->session_mutex); goto out; @@ -397,6 +402,7 @@ out: case SMB2_SET_INFO: rc = -EAGAIN; } +failed: unload_nls(nls_codepage); return rc; }