Re: [PATCH] cifs: fix regression in very old smb1 mounts

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 07.11.22 14:31, ronnie sahlberg wrote:
> On Mon, 7 Nov 2022 at 23:20, Thorsten Leemhuis
> <regressions@xxxxxxxxxxxxx> wrote:
>>
>> On 01.11.22 18:53, Thorsten Leemhuis wrote:
>>> On 12.10.22 01:12, Ronnie Sahlberg wrote:
>>>> BZ: 215375
>>>>
>>>> Fixes: 76a3c92ec9e0668e4cd0e9ff1782eb68f61a179c ("cifs: remove support for NTLM and weaker authentication algorithms")
>>>> Signed-off-by: Ronnie Sahlberg <lsahlber@xxxxxxxxxx>
>>>
>>> Ronnie, Steve, did this change create any trouble in 6.1 pre-releases so
>>> far? If not: could you please consider submitting this change for
>>> inclusion in 6.0 and 5.15, as this is a regression from the 5.15 days
>>> that according to the bugzilla ticket seem to annoy some people a lot.
>>
>> Ronnie, Steve, if you have a minute, I would really appreciate your help
>> in this matter, you are the best people to judge here.
> 
> Thanks for the reminder.  I don't think there were any issues in the
> pre-release so we should try to get it into the stable kernels.

Great.

> I am not sure how that process works since the patch is already in upstream.
> (I have only seen the process where you flag the patch with cc-stable.)
> Can you explain the process on how to flag this existing patch for backporting?

Documentation/process/stable-kernel-rules.rst (or
https://docs.kernel.org/process/stable-kernel-rules.html ) explains this
(see option 3 there) better than I can. The patch afaics needs to got to
6.0 and 5.15.

Many thx for taking care of this!

Ciao, Thorsten


>>>> ---
>>>>  fs/cifs/connect.c | 11 +++++------
>>>>  1 file changed, 5 insertions(+), 6 deletions(-)
>>>>
>>>> diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c
>>>> index 93e59b3b36c7..c77232096c12 100644
>>>> --- a/fs/cifs/connect.c
>>>> +++ b/fs/cifs/connect.c
>>>> @@ -3922,12 +3922,11 @@ CIFSTCon(const unsigned int xid, struct cifs_ses *ses,
>>>>      pSMB->AndXCommand = 0xFF;
>>>>      pSMB->Flags = cpu_to_le16(TCON_EXTENDED_SECINFO);
>>>>      bcc_ptr = &pSMB->Password[0];
>>>> -    if (tcon->pipe || (ses->server->sec_mode & SECMODE_USER)) {
>>>> -            pSMB->PasswordLength = cpu_to_le16(1);  /* minimum */
>>>> -            *bcc_ptr = 0; /* password is null byte */
>>>> -            bcc_ptr++;              /* skip password */
>>>> -            /* already aligned so no need to do it below */
>>>> -    }
>>>> +
>>>> +    pSMB->PasswordLength = cpu_to_le16(1);  /* minimum */
>>>> +    *bcc_ptr = 0; /* password is null byte */
>>>> +    bcc_ptr++;              /* skip password */
>>>> +    /* already aligned so no need to do it below */
>>>>
>>>>      if (ses->server->sign)
>>>>              smb_buffer->Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
> 



[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux