Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp707333ybv; Thu, 13 Feb 2020 08:06:32 -0800 (PST) X-Google-Smtp-Source: APXvYqyxI3I2sYQC80oszDw2B7BzSpJ7dyt5jXOINsSJGVwc8iq1Vi1skwMmzLzl0gmADBGtj2p8 X-Received: by 2002:aca:d4ca:: with SMTP id l193mr3468750oig.133.1581609991843; Thu, 13 Feb 2020 08:06:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581609991; cv=none; d=google.com; s=arc-20160816; b=kcN8xgG7eT/S+eXxmymkWsDlfGglglAG80v80CKOl/YNdhtjUbSFQRqxY2MBGA9Xxh ZN7jt+Ul4ne/sNZjmfZo61U4/QIPXRY7bsEfhTpD2bUxkDLb9BaDEfPR+VtdEa9s6IlE gdnwT4V+TfrtrbXSqJEEXEZZB0AGUT5oc7puK/zZXQfHyZzcQ1RQ5HRwCzu7bsfikAS6 axd/ztHeq4fLi5R4vS9BVYjxpIqUq5O6gIFvWPdWoPKHt3E64VtGkPzsY0tZ5b/A6Jc6 faFaTC8oP1TYZNX+2OqdGpbJV9jEVKi57hcd4N6Qy+z+gl3KhIzoGXMFYbiVsHyAjy0r 4YUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=l0dvQU54XGZEtTbZFAvhZjDkx3yzFh/KxxC4gNyVeqs=; b=SHbojEPqi9lh2r5OnnibV0Ip6IJhfRIN/6WwLEUAkRoS/VsQ/J0oJC/2uzwL4jQmBO LTVPfkoxhL/Yk/5XZsRKhqWnpbWGKRKWBq3lywLGamTR143HMhhuoW2Ixe77+4gpghOj QBi+GHv9luaTW4VEMU3n3H2K1Cz8bakPIq4MPTCoQokGfwXjd87EpmHQ4m19DwhouliR X2l0y014Myk7ckKNSzAsgyDOkq/tWa2/GKS9cmNIDY0vRp99FAcgkUGB2FfTTHm0Cfef FY0QTFMiCHUcwR/A0/RHJMVXS/5BW8Dma8N5ohgRFVqFbusN7o00bp8NL8gHY/Gd+hGB npRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=a3P039h2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s22si1427080otq.100.2020.02.13.08.06.16; Thu, 13 Feb 2020 08:06:31 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=a3P039h2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730290AbgBMQEA (ORCPT + 99 others); Thu, 13 Feb 2020 11:04:00 -0500 Received: from mail.kernel.org ([198.145.29.99]:36966 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728615AbgBMPYK (ORCPT ); Thu, 13 Feb 2020 10:24:10 -0500 Received: from localhost (unknown [104.132.1.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B915324689; Thu, 13 Feb 2020 15:24:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1581607449; bh=RKKb/C9mxcMwscJPK+XW7IOIY8L/zMq2chZNUwE3UTg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=a3P039h2IziMgZOwJxwffRndGuG/+MfLjkjiQZawDNnrx1jl+Z4CS94MMRqKI9lL7 eHQPB8dhp3uYjdRvz49TkxP44xWEErZbpv1B+ifIOj0OG10AMdm9lz64bEzuGyaxnN OiUPkr7kvULjGzkx7dm8JDffSz7J7CsH4rqLko40= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ronnie Sahlberg , Steve French Subject: [PATCH 4.9 093/116] cifs: fail i/o on soft mounts if sessionsetup errors out Date: Thu, 13 Feb 2020 07:20:37 -0800 Message-Id: <20200213151919.097142220@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200213151842.259660170@linuxfoundation.org> References: <20200213151842.259660170@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ronnie Sahlberg commit b0dd940e582b6a60296b9847a54012a4b080dc72 upstream. RHBZ: 1579050 If we have a soft mount we should fail commands for session-setup failures (such as the password having changed/ account being deleted/ ...) and return an error back to the application. Signed-off-by: Ronnie Sahlberg Signed-off-by: Steve French CC: Stable Signed-off-by: Greg Kroah-Hartman --- fs/cifs/smb2pdu.c | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) --- a/fs/cifs/smb2pdu.c +++ b/fs/cifs/smb2pdu.c @@ -247,9 +247,14 @@ smb2_reconnect(__le16 smb2_command, stru */ mutex_lock(&tcon->ses->session_mutex); rc = cifs_negotiate_protocol(0, tcon->ses); - if (!rc && tcon->ses->need_reconnect) + if (!rc && tcon->ses->need_reconnect) { rc = cifs_setup_session(0, tcon->ses, nls_codepage); - + if ((rc == -EACCES) && !tcon->retry) { + rc = -EHOSTDOWN; + mutex_unlock(&tcon->ses->session_mutex); + goto failed; + } + } if (rc || !tcon->need_reconnect) { mutex_unlock(&tcon->ses->session_mutex); goto out; @@ -291,6 +296,7 @@ out: case SMB2_SET_INFO: rc = -EAGAIN; } +failed: unload_nls(nls_codepage); return rc; }