Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
E
etercifs
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
etersoft
etercifs
Commits
63d78119
Commit
63d78119
authored
Jul 02, 2016
by
Pavel Shilovsky
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Update 3.12 sources from stable (v3.12.61)
parent
8cdfe6c0
Hide whitespace changes
Inline
Side-by-side
Showing
8 changed files
with
79 additions
and
28 deletions
+79
-28
cifsencrypt.c
sources/3.12/cifsencrypt.c
+1
-1
cifssmb.c
sources/3.12/cifssmb.c
+18
-3
readdir.c
sources/3.12/readdir.c
+1
-0
sess.c
sources/3.12/sess.c
+20
-12
smb2glob.h
sources/3.12/smb2glob.h
+1
-0
smb2inode.c
sources/3.12/smb2inode.c
+6
-2
smb2pdu.c
sources/3.12/smb2pdu.c
+30
-10
smb2proto.h
sources/3.12/smb2proto.h
+2
-0
No files found.
sources/3.12/cifsencrypt.c
View file @
63d78119
...
...
@@ -703,7 +703,7 @@ setup_ntlmv2_rsp(struct cifs_ses *ses, const struct nls_table *nls_cp)
ses
->
auth_key
.
response
=
kmalloc
(
baselen
+
tilen
,
GFP_KERNEL
);
if
(
!
ses
->
auth_key
.
response
)
{
rc
=
ENOMEM
;
rc
=
-
ENOMEM
;
ses
->
auth_key
.
len
=
0
;
goto
setup_ntlmv2_rsp_ret
;
}
...
...
sources/3.12/cifssmb.c
View file @
63d78119
...
...
@@ -1385,11 +1385,10 @@ openRetry:
* current bigbuf.
*/
static
int
cifs_readv_discard
(
struct
TCP_Server_Info
*
server
,
struct
mid_q_entry
*
mid
)
discard_remaining_data
(
struct
TCP_Server_Info
*
server
)
{
unsigned
int
rfclen
=
get_rfc1002_length
(
server
->
smallbuf
);
int
remaining
=
rfclen
+
4
-
server
->
total_read
;
struct
cifs_readdata
*
rdata
=
mid
->
callback_data
;
while
(
remaining
>
0
)
{
int
length
;
...
...
@@ -1403,10 +1402,20 @@ cifs_readv_discard(struct TCP_Server_Info *server, struct mid_q_entry *mid)
remaining
-=
length
;
}
dequeue_mid
(
mid
,
rdata
->
result
);
return
0
;
}
static
int
cifs_readv_discard
(
struct
TCP_Server_Info
*
server
,
struct
mid_q_entry
*
mid
)
{
int
length
;
struct
cifs_readdata
*
rdata
=
mid
->
callback_data
;
length
=
discard_remaining_data
(
server
);
dequeue_mid
(
mid
,
rdata
->
result
);
return
length
;
}
int
cifs_readv_receive
(
struct
TCP_Server_Info
*
server
,
struct
mid_q_entry
*
mid
)
{
...
...
@@ -1435,6 +1444,12 @@ cifs_readv_receive(struct TCP_Server_Info *server, struct mid_q_entry *mid)
return
length
;
server
->
total_read
+=
length
;
if
(
server
->
ops
->
is_status_pending
&&
server
->
ops
->
is_status_pending
(
buf
,
server
,
0
))
{
discard_remaining_data
(
server
);
return
-
1
;
}
/* Was the SMB read successful? */
rdata
->
result
=
server
->
ops
->
map_error
(
buf
,
false
);
if
(
rdata
->
result
!=
0
)
{
...
...
sources/3.12/readdir.c
View file @
63d78119
...
...
@@ -849,6 +849,7 @@ int cifs_readdir(struct file *file, struct dir_context *ctx)
* if buggy server returns . and .. late do we want to
* check for that here?
*/
*
tmp_buf
=
0
;
rc
=
cifs_filldir
(
current_entry
,
file
,
ctx
,
tmp_buf
,
max_len
);
if
(
rc
)
{
...
...
sources/3.12/sess.c
View file @
63d78119
...
...
@@ -399,19 +399,27 @@ int build_ntlmssp_auth_blob(unsigned char *pbuffer,
sec_blob
->
LmChallengeResponse
.
MaximumLength
=
0
;
sec_blob
->
NtChallengeResponse
.
BufferOffset
=
cpu_to_le32
(
tmp
-
pbuffer
);
rc
=
setup_ntlmv2_rsp
(
ses
,
nls_cp
);
if
(
rc
)
{
cifs_dbg
(
VFS
,
"Error %d during NTLMSSP authentication
\n
"
,
rc
);
goto
setup_ntlmv2_ret
;
}
memcpy
(
tmp
,
ses
->
auth_key
.
response
+
CIFS_SESS_KEY_SIZE
,
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
);
tmp
+=
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
;
if
(
ses
->
user_name
!=
NULL
)
{
rc
=
setup_ntlmv2_rsp
(
ses
,
nls_cp
);
if
(
rc
)
{
cifs_dbg
(
VFS
,
"Error %d during NTLMSSP authentication
\n
"
,
rc
);
goto
setup_ntlmv2_ret
;
}
memcpy
(
tmp
,
ses
->
auth_key
.
response
+
CIFS_SESS_KEY_SIZE
,
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
);
tmp
+=
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
;
sec_blob
->
NtChallengeResponse
.
Length
=
cpu_to_le16
(
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
);
sec_blob
->
NtChallengeResponse
.
MaximumLength
=
cpu_to_le16
(
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
);
sec_blob
->
NtChallengeResponse
.
Length
=
cpu_to_le16
(
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
);
sec_blob
->
NtChallengeResponse
.
MaximumLength
=
cpu_to_le16
(
ses
->
auth_key
.
len
-
CIFS_SESS_KEY_SIZE
);
}
else
{
/*
* don't send an NT Response for anonymous access
*/
sec_blob
->
NtChallengeResponse
.
Length
=
0
;
sec_blob
->
NtChallengeResponse
.
MaximumLength
=
0
;
}
if
(
ses
->
domainName
==
NULL
)
{
sec_blob
->
DomainName
.
BufferOffset
=
cpu_to_le32
(
tmp
-
pbuffer
);
...
...
sources/3.12/smb2glob.h
View file @
63d78119
...
...
@@ -44,6 +44,7 @@
#define SMB2_OP_DELETE 7
#define SMB2_OP_HARDLINK 8
#define SMB2_OP_SET_EOF 9
#define SMB2_OP_RMDIR 10
/* Used when constructing chained read requests. */
#define CHAINED_REQUEST 1
...
...
sources/3.12/smb2inode.c
View file @
63d78119
...
...
@@ -81,6 +81,10 @@ smb2_open_op_close(const unsigned int xid, struct cifs_tcon *tcon,
* SMB2_open() call.
*/
break
;
case
SMB2_OP_RMDIR
:
tmprc
=
SMB2_rmdir
(
xid
,
tcon
,
fid
.
persistent_fid
,
fid
.
volatile_fid
);
break
;
case
SMB2_OP_RENAME
:
tmprc
=
SMB2_rename
(
xid
,
tcon
,
fid
.
persistent_fid
,
fid
.
volatile_fid
,
(
__le16
*
)
data
);
...
...
@@ -192,8 +196,8 @@ smb2_rmdir(const unsigned int xid, struct cifs_tcon *tcon, const char *name,
struct
cifs_sb_info
*
cifs_sb
)
{
return
smb2_open_op_close
(
xid
,
tcon
,
cifs_sb
,
name
,
DELETE
,
FILE_OPEN
,
CREATE_NOT_FILE
|
CREATE_DELETE_ON_CLOSE
,
NULL
,
SMB2_OP_
DELETE
);
CREATE_NOT_FILE
,
NULL
,
SMB2_OP_
RMDIR
);
}
int
...
...
sources/3.12/smb2pdu.c
View file @
63d78119
...
...
@@ -1000,21 +1000,25 @@ parse_lease_state(struct TCP_Server_Info *server, struct smb2_create_rsp *rsp,
{
char
*
data_offset
;
struct
create_context
*
cc
;
unsigned
int
next
=
0
;
unsigned
int
next
;
unsigned
int
remaining
;
char
*
name
;
data_offset
=
(
char
*
)
rsp
+
4
+
le32_to_cpu
(
rsp
->
CreateContextsOffset
);
remaining
=
le32_to_cpu
(
rsp
->
CreateContextsLength
);
cc
=
(
struct
create_context
*
)
data_offset
;
do
{
cc
=
(
struct
create_context
*
)((
char
*
)
cc
+
next
);
while
(
remaining
>=
sizeof
(
struct
create_context
))
{
name
=
le16_to_cpu
(
cc
->
NameOffset
)
+
(
char
*
)
cc
;
if
(
le16_to_cpu
(
cc
->
NameLength
)
!=
4
||
strncmp
(
name
,
"RqLs"
,
4
))
{
next
=
le32_to_cpu
(
cc
->
Next
);
continue
;
}
return
server
->
ops
->
parse_lease_buf
(
cc
,
epoch
);
}
while
(
next
!=
0
);
if
(
le16_to_cpu
(
cc
->
NameLength
)
==
4
&&
strncmp
(
name
,
"RqLs"
,
4
)
==
0
)
return
server
->
ops
->
parse_lease_buf
(
cc
,
epoch
);
next
=
le32_to_cpu
(
cc
->
Next
);
if
(
!
next
)
break
;
remaining
-=
next
;
cc
=
(
struct
create_context
*
)((
char
*
)
cc
+
next
);
}
return
0
;
}
...
...
@@ -2250,6 +2254,22 @@ SMB2_rename(const unsigned int xid, struct cifs_tcon *tcon,
}
int
SMB2_rmdir
(
const
unsigned
int
xid
,
struct
cifs_tcon
*
tcon
,
u64
persistent_fid
,
u64
volatile_fid
)
{
__u8
delete_pending
=
1
;
void
*
data
;
unsigned
int
size
;
data
=
&
delete_pending
;
size
=
1
;
/* sizeof __u8 */
return
send_set_info
(
xid
,
tcon
,
persistent_fid
,
volatile_fid
,
current
->
tgid
,
FILE_DISPOSITION_INFORMATION
,
1
,
&
data
,
&
size
);
}
int
SMB2_set_hardlink
(
const
unsigned
int
xid
,
struct
cifs_tcon
*
tcon
,
u64
persistent_fid
,
u64
volatile_fid
,
__le16
*
target_file
)
{
...
...
sources/3.12/smb2proto.h
View file @
63d78119
...
...
@@ -133,6 +133,8 @@ extern int SMB2_query_directory(const unsigned int xid, struct cifs_tcon *tcon,
extern
int
SMB2_rename
(
const
unsigned
int
xid
,
struct
cifs_tcon
*
tcon
,
u64
persistent_fid
,
u64
volatile_fid
,
__le16
*
target_file
);
extern
int
SMB2_rmdir
(
const
unsigned
int
xid
,
struct
cifs_tcon
*
tcon
,
u64
persistent_fid
,
u64
volatile_fid
);
extern
int
SMB2_set_hardlink
(
const
unsigned
int
xid
,
struct
cifs_tcon
*
tcon
,
u64
persistent_fid
,
u64
volatile_fid
,
__le16
*
target_file
);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment