Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp3342685pxb; Sun, 29 Aug 2021 22:53:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxAj76osw+DQgyEvJWzSeNOR6HO22WGEjvk8241AiGKmYanaPGtLy8yawwRDFNgWH49YH4o X-Received: by 2002:a17:906:6547:: with SMTP id u7mr22898903ejn.544.1630302796242; Sun, 29 Aug 2021 22:53:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1630302796; cv=none; d=google.com; s=arc-20160816; b=YP1Buwi28GoIysZbPm9alLvTTiZS7evpCru/St0FT8X6mVGT5a/w0mTcPfrSXmkj3j apY9RCDBDh/u2LHydR38H2buhE8d7pUCeU6qZNklF32S3UWPJ4pzaJrMeMujr6OkU2CF CNFuznxhJ8uY8FGdqJCJBeJR/brkCz85FPg5tU6hm1aC44SlDxaJUJMLh2rOwmDkBeII 6DJ5qjzSp6cl8AsEM9j/hC4jdC3m1+Km3Z9zVM9eUYmyCRMf8oMObKr4/JCJ5zSf7O+F jJTc9tgHKolWxECBTaTvS70lX17UX9Zc5NHQVdeoncPadZGu1CAWW2E4+wnd4jD0Fyk1 2DnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:mime-version :dkim-signature; bh=h6S1rlsuhQbbfaHSm0DcTq2usBWQ0P+C1lfcBqs7THk=; b=qG6UILUZy1qkfuO1SxAXHSJtl/UuB4aWN6eKQZdjH6Jb0Z6vDVJZjBc80n4NR4uYMq +XjaKb9ViMpR0V+dVPkIh5Z/DjGBqYBWoU8PgO/kpF/EoGbHbWjjGbycvvHY7DkmevMw YNvK82bf370EiIog2r8Cea7eE0BBSac2cu1NgTqinK/Sx7ZOyqiz9O6AI589xnyU7EN5 f5StXqr8kAFHvcJVIDBEtsIpoAUJA6ZyvYzeD1+CrV9C+CAe6i5hCYrj7Pfha/0fnnrD +aECOAr/bkgwJANzGtxh71sYvsZU+sA+dwpi8rJOTz74O1fkKzGAUxdXnBWHJMpSmjqD 6K4A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=HRqs6fFq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l23si13388277eds.327.2021.08.29.22.52.49; Sun, 29 Aug 2021 22:53:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=HRqs6fFq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232300AbhH3Fti (ORCPT + 99 others); Mon, 30 Aug 2021 01:49:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41600 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232063AbhH3Fti (ORCPT ); Mon, 30 Aug 2021 01:49:38 -0400 Received: from mail-lf1-x132.google.com (mail-lf1-x132.google.com [IPv6:2a00:1450:4864:20::132]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B4E18C061575; Sun, 29 Aug 2021 22:48:44 -0700 (PDT) Received: by mail-lf1-x132.google.com with SMTP id m18so14785161lfl.10; Sun, 29 Aug 2021 22:48:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to:cc; bh=h6S1rlsuhQbbfaHSm0DcTq2usBWQ0P+C1lfcBqs7THk=; b=HRqs6fFqwgiAASLA7HMs8CUA1JrGF+jhmv/z64PoGj6np49yf/Hl3Bra7AwI4B4mGF s3h03mEszT4pbCPF7Puw3cTSpZqQcCXB+p4wOR+VMHANjRf/Iq6yy0ZemYBSzaRIoY+m giZgqrA6e6bdndPM3VqYPibE6XuNIZKGxnBvn/e6SO4PMuz2+g5PKOUrVG6PRzqhBt6L PXSCATFVLsypGl5ZWtTkSgXj2eGBWDIfFUbVsivKXk+xLv0JFgqtDNSkVM+ioU/aqCxM 9NTgTShQtxDJGBps/qMZejvTDVIr2Au/3Vu54y4JT+cOYHMbRKghrcR4HarQXXWzwtML FQLw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=h6S1rlsuhQbbfaHSm0DcTq2usBWQ0P+C1lfcBqs7THk=; b=HLLj0RPAGbc9yzF0f11NWCa6nUg3HURQZet/WTi1yLJydI3G3++IZ+k8b4H7cc8Dpr ZMtynVMwLAWyiWjjKGbtvN38w/oLNUlHi6IuFG4g1Q/vNsJNcv0e/D283kshzL+RZbZA CXGesXMN83WkY2Hfm3j1EVC2ZX+I10Q4YYHAuZweJTEmEVp7vZtco0G2KDeRbkWAygGf W+B4r8bdR6EZqblbJAZiHzV4ETPqNBTq6zvZy1siqLhicWIrstnLZeaDYiGWXsj9omLN Ptd3zdl3vO9uhkkC0nFx0KNMvj3Ns+yg36yR+KT+SyUVqyBwz9g9SvIT0kiNeRL1SkM8 ZUqg== X-Gm-Message-State: AOAM53170LDjZO72Lhcvz8udqFQ7V4uJWX925xcjzqu5ACXySnUHWESR 3wwDFni0txy5LGLyH3ToKCySWLHakrqXplVh4e+c/KE19kg= X-Received: by 2002:a19:c7c3:: with SMTP id x186mr12895274lff.175.1630302522939; Sun, 29 Aug 2021 22:48:42 -0700 (PDT) MIME-Version: 1.0 From: Steve French Date: Mon, 30 Aug 2021 00:48:32 -0500 Message-ID: Subject: [GIT PULL] cifs/smb3 client fixes To: Linus Torvalds Cc: LKML , CIFS Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Please pull the following changes since commit e22ce8eb631bdc47a4a4ea7ecf4e4ba499db4f93: Linux 5.14-rc7 (2021-08-22 14:24:56 -0700) are available in the Git repository at: git://git.samba.org/sfrench/cifs-2.6.git tags/5.15-rc-smb3-fixes-part1 for you to fetch changes up to 3998f0b8bc49ec784990971dc1f16bf367b19078: cifs: Do not leak EDEADLK to dgetents64 for STATUS_USER_SESSION_DELETED (2021-08-25 16:08:38 -0500) ---------------------------------------------------------------- 11 cifs/smb3 client fixes: - mostly restructuring to allow disabling less secure algorithms (this will allow eventual removing rc4 and md4 from general use in the kernel) - 4 fixes, including 2 for stable - enable r/w support with fscache and cifs.ko Am working on a larger set of changes (the usual ... multichannel, auth and signing improvements), but wanted to get these in earlier to reduce chance of merge conflicts later in the merge window. ---------------------------------------------------------------- Ding Hui (1): cifs: fix wrong release in sess_alloc_buffer() failed path Len Baker (1): CIFS: Fix a potencially linear read overflow Ronnie Sahlberg (4): cifs: remove support for NTLM and weaker authentication algorithms cifs: fork arc4 and create a separate module for it for cifs and other users cifs: create a MD4 module and switch cifs.ko to use it cifs: Do not leak EDEADLK to dgetents64 for STATUS_USER_SESSION_DELETED Shyam Prasad N (1): cifs: enable fscache usage even for files opened as rw Steve French (4): smb3: fix posix extensions mount option oid_registry: Add OIDs for missing Spnego auth mechanisms to Macs cifs: cifs_md4 convert to SPDX identifier cifs: add cifs_common directory to MAINTAINERS file MAINTAINERS | 1 + fs/Kconfig | 7 ++ fs/Makefile | 1 + fs/cifs/Kconfig | 30 ------- fs/cifs/cifs_debug.c | 11 --- fs/cifs/cifs_swn.c | 2 - fs/cifs/cifs_unicode.c | 9 +- fs/cifs/cifsencrypt.c | 89 +------------------- fs/cifs/cifsfs.c | 8 -- fs/cifs/cifsglob.h | 32 +------ fs/cifs/cifspdu.h | 28 ------- fs/cifs/cifsproto.h | 10 --- fs/cifs/cifssmb.c | 107 +----------------------- fs/cifs/connect.c | 32 ------- fs/cifs/file.c | 15 +++- fs/cifs/fs_context.c | 25 ++---- fs/cifs/fs_context.h | 3 - fs/cifs/fscache.c | 41 +++++++-- fs/cifs/fscache.h | 23 ++++++ fs/cifs/inode.c | 6 ++ fs/cifs/readdir.c | 23 +++++- fs/cifs/sess.c | 257 +-------------------------------------------------------- fs/cifs/smb2maperror.c | 1 - fs/cifs/smbencrypt.c | 139 +++---------------------------- fs/cifs_common/Makefile | 7 ++ fs/cifs_common/arc4.h | 23 ++++++ fs/cifs_common/cifs_arc4.c | 87 +++++++++++++++++++ fs/cifs_common/cifs_md4.c | 197 +++++++++++++++++++++++++++++++++++++++++++ fs/cifs_common/md4.h | 27 ++++++ include/linux/oid_registry.h | 7 ++ 30 files changed, 485 insertions(+), 763 deletions(-) create mode 100644 fs/cifs_common/Makefile create mode 100644 fs/cifs_common/arc4.h create mode 100644 fs/cifs_common/cifs_arc4.c create mode 100644 fs/cifs_common/cifs_md4.c create mode 100644 fs/cifs_common/md4.h -- Thanks, Steve