Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp2440rwb; Fri, 13 Jan 2023 17:59:15 -0800 (PST) X-Google-Smtp-Source: AMrXdXsM5XGS9GJj/eiTH8L94z+EPfKCK7/SoFTlyn+zELM34Gevm/3ZRWuTNslBXmWMgsVuo168 X-Received: by 2002:a05:6a20:3d26:b0:a4:69a2:6dd7 with SMTP id y38-20020a056a203d2600b000a469a26dd7mr108642853pzi.0.1673661555149; Fri, 13 Jan 2023 17:59:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673661555; cv=none; d=google.com; s=arc-20160816; b=qjvBfGlHrWYUkACWNK1ASOcDdU3Jfi5kWamEbgomf8PMpLTI860eW0nKF3ekQCXmrk u8ImwRjL3M6hSgFe6E+qauSQFlNcY2MtiplW8W9fS2YevkeOoDQpzL4RMXRSwIdOx9ls LGzZ3V/PXEDTQ5QmmydnOqGIjptgnoBq9TYFWKcDxOMjTk5Ld4z/wa4CvljRPsxN/NC4 08BkHpMlRo7Y/kfBjRLktVyfWo28Zqb0JNdHTCPVrasDEPFygyjINl2E8LLK96YAjb9D OUD4JCkwm/i30JKK2SeglBee8UFFJTrpxFEC+/Nqu19dQcd2n+fh3/gNuloyG61yLtAk Vaiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:mime-version :dkim-signature; bh=W6Nb5m59yqglWarTpIWBsMtluzB3GAv0iVhqzRthZkw=; b=CwXyzXgWUJumPisfRcXgO7WGLGf95hmK5QIce14YylMSh1SOJgewG5P2Isaxwg4cSq Y3MTkjsdqDmPdivyrPqf3loOLX0d7Mxr+/BnGgT+9MeFnmbsgGg0BnWPtbtLnaXE4hU5 b9PhxiDvL3EUsNcE9Uu0eWV1JokENue46NkPyQcWSdSs5xPHA9Lvl9pwFBFpClTQzjAJ zaPYPGRqqn6YhfMWX6X2GbnZVz7S0zoixsc5Zea3AsFYF8aWCdO9Sc9hgwzW+M1OlXx6 AgY4zQS49laKskMx31b9/4lE3wB3cEgCoz7MLM5QRK4MFloJbmnRXTCHfSo5luvFUMaj rNLg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=odcuyC3O; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f6-20020a636a06000000b0047882ff26basi22444558pgc.475.2023.01.13.17.59.08; Fri, 13 Jan 2023 17:59:15 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=odcuyC3O; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230401AbjANBT0 (ORCPT + 55 others); Fri, 13 Jan 2023 20:19:26 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54982 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229996AbjANBTX (ORCPT ); Fri, 13 Jan 2023 20:19:23 -0500 Received: from mail-lf1-x131.google.com (mail-lf1-x131.google.com [IPv6:2a00:1450:4864:20::131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A73AD8BAAE; Fri, 13 Jan 2023 17:19:22 -0800 (PST) Received: by mail-lf1-x131.google.com with SMTP id x40so1354585lfu.12; Fri, 13 Jan 2023 17:19:22 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=W6Nb5m59yqglWarTpIWBsMtluzB3GAv0iVhqzRthZkw=; b=odcuyC3Oj+RheC1ROv3uSXzK2A+S4NC1M1qQA5dyP7STuyhiptCmC0KaTBlbg1MDCu 9ImWVpN9UIqKfHWZLKLgJXjMgRB8iHEtgMzAePR8OHQIqysVtnSrhWAdTr5P9uq12CT5 d0nBOjhn2rI+BGQFeEBKWNYeGPu7N7eqxtMJ07GboBHsRa1hBLCXi9JpiV4eY1fZNo0w Phd5gUwEzORmezPRrcmXf9DLdkPJCRt2XnhA4O8VXxd/ILeko5me6tNX0ILOeUmRnt5x RAOPKdgCi0ZUnI1NXLzmrzUzggaAArgj+XcGI5xLoh8SBQEWpEwbNH2LiX7cNfeY3Yly 9Mbg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=W6Nb5m59yqglWarTpIWBsMtluzB3GAv0iVhqzRthZkw=; b=Q8RMpa5WEf1R4SsvXwdcULqkKArPoKSYdHhrV9edAlQHSxHfL6iLVTMkEHUNW833ck uY1CZz8NQkfnRuJ8GWs0O7WDYX+6MLZE6fTNglkU4s5f3idsgxVrzskw0yO1LCijfXB0 Ai4Vhlx0WLM9Kv8JKNbMUj3X9Owqmj4hxXMt25gDm7ZQ6Zb4kazVOCHzjuAmLhBHGNZw yd8T+BPXsA2Hehg3wEhrFkZeixvp8dNFOoaSrFcsTxOyCMdWo4Fivpb8fc3xJTXWMjCq Fih31Q2qfmj+jABLHoT3ALPJdzOeFHb0dIdDnqAezZ9AkdvBiMjkg6CB84iIirEeedSX i53w== X-Gm-Message-State: AFqh2krD8+15cKUtNA8+yyYDP6R9P+JAaw0Qsep7f7hXE+L67uvOzoi0 M3tLl2Y9OMu0/X+sDi0+icf4U1rhFdNeikiUlYqMozms+18= X-Received: by 2002:a05:6512:14d:b0:4cb:3a2f:26d1 with SMTP id m13-20020a056512014d00b004cb3a2f26d1mr2053745lfo.303.1673659160883; Fri, 13 Jan 2023 17:19:20 -0800 (PST) MIME-Version: 1.0 From: Steve French Date: Fri, 13 Jan 2023 19:19:09 -0600 Message-ID: Subject: [GIT PULL] smb3 client fixes To: Linus Torvalds Cc: LKML , CIFS Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Please pull the following changes since commit b7bfaa761d760e72a969d116517eaa12e404c262: Linux 6.2-rc3 (2023-01-08 11:49:43 -0600) are available in the Git repository at: git://git.samba.org/sfrench/cifs-2.6.git tags/6.2-rc3-smb3-client-fixes for you to fetch changes up to a152d05ae4a71d802d50cf9177dba34e8bb09f68: cifs: Fix uninitialized memory read for smb311 posix symlink create (2023-01-12 09:51:48 -0600) ---------------------------------------------------------------- 7 smb3 client fixes, most also for stable - memory leak and double free fix - two symlink fixes - minor cleanup fix - two smb1 fixes ---------------------------------------------------------------- Colin Ian King (1): cifs: remove redundant assignment to the variable match Paulo Alcantara (5): cifs: fix file info setting in cifs_query_path_info() cifs: fix file info setting in cifs_open_file() cifs: fix double free on failed kerberos auth cifs: do not query ifaces on smb1 mounts cifs: fix potential memory leaks in session setup Volker Lendecke (1): cifs: Fix uninitialized memory read for smb311 posix symlink create fs/cifs/cifsencrypt.c | 1 + fs/cifs/connect.c | 9 +++++--- fs/cifs/dfs_cache.c | 1 - fs/cifs/link.c | 1 + fs/cifs/sess.c | 2 ++ fs/cifs/smb1ops.c | 63 +++++++++++++++++++++++++++------------------------ fs/cifs/smb2pdu.c | 6 ++++- 7 files changed, 49 insertions(+), 34 deletions(-) -- Thanks, Steve