[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAH2r5mvVdBoUW-0BfsxiRAE6X30cqhBtNDvG7pwKdQwsu+wXfg@mail.gmail.com>
Date: Mon, 30 Aug 2021 00:48:32 -0500
From: Steve French <smfrench@...il.com>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: LKML <linux-kernel@...r.kernel.org>,
CIFS <linux-cifs@...r.kernel.org>
Subject: [GIT PULL] cifs/smb3 client fixes
Please pull the following changes since commit
e22ce8eb631bdc47a4a4ea7ecf4e4ba499db4f93:
Linux 5.14-rc7 (2021-08-22 14:24:56 -0700)
are available in the Git repository at:
git://git.samba.org/sfrench/cifs-2.6.git tags/5.15-rc-smb3-fixes-part1
for you to fetch changes up to 3998f0b8bc49ec784990971dc1f16bf367b19078:
cifs: Do not leak EDEADLK to dgetents64 for
STATUS_USER_SESSION_DELETED (2021-08-25 16:08:38 -0500)
----------------------------------------------------------------
11 cifs/smb3 client fixes:
- mostly restructuring to allow disabling less secure algorithms (this
will allow eventual removing rc4 and md4 from general use in the
kernel)
- 4 fixes, including 2 for stable
- enable r/w support with fscache and cifs.ko
Am working on a larger set of changes (the usual ... multichannel,
auth and signing improvements), but wanted to get these in earlier to
reduce chance of merge conflicts
later in the merge window.
----------------------------------------------------------------
Ding Hui (1):
cifs: fix wrong release in sess_alloc_buffer() failed path
Len Baker (1):
CIFS: Fix a potencially linear read overflow
Ronnie Sahlberg (4):
cifs: remove support for NTLM and weaker authentication algorithms
cifs: fork arc4 and create a separate module for it for cifs and
other users
cifs: create a MD4 module and switch cifs.ko to use it
cifs: Do not leak EDEADLK to dgetents64 for STATUS_USER_SESSION_DELETED
Shyam Prasad N (1):
cifs: enable fscache usage even for files opened as rw
Steve French (4):
smb3: fix posix extensions mount option
oid_registry: Add OIDs for missing Spnego auth mechanisms to Macs
cifs: cifs_md4 convert to SPDX identifier
cifs: add cifs_common directory to MAINTAINERS file
MAINTAINERS | 1 +
fs/Kconfig | 7 ++
fs/Makefile | 1 +
fs/cifs/Kconfig | 30 -------
fs/cifs/cifs_debug.c | 11 ---
fs/cifs/cifs_swn.c | 2 -
fs/cifs/cifs_unicode.c | 9 +-
fs/cifs/cifsencrypt.c | 89 +-------------------
fs/cifs/cifsfs.c | 8 --
fs/cifs/cifsglob.h | 32 +------
fs/cifs/cifspdu.h | 28 -------
fs/cifs/cifsproto.h | 10 ---
fs/cifs/cifssmb.c | 107 +-----------------------
fs/cifs/connect.c | 32 -------
fs/cifs/file.c | 15 +++-
fs/cifs/fs_context.c | 25 ++----
fs/cifs/fs_context.h | 3 -
fs/cifs/fscache.c | 41 +++++++--
fs/cifs/fscache.h | 23 ++++++
fs/cifs/inode.c | 6 ++
fs/cifs/readdir.c | 23 +++++-
fs/cifs/sess.c | 257
+--------------------------------------------------------
fs/cifs/smb2maperror.c | 1 -
fs/cifs/smbencrypt.c | 139 +++----------------------------
fs/cifs_common/Makefile | 7 ++
fs/cifs_common/arc4.h | 23 ++++++
fs/cifs_common/cifs_arc4.c | 87 +++++++++++++++++++
fs/cifs_common/cifs_md4.c | 197 +++++++++++++++++++++++++++++++++++++++++++
fs/cifs_common/md4.h | 27 ++++++
include/linux/oid_registry.h | 7 ++
30 files changed, 485 insertions(+), 763 deletions(-)
create mode 100644 fs/cifs_common/Makefile
create mode 100644 fs/cifs_common/arc4.h
create mode 100644 fs/cifs_common/cifs_arc4.c
create mode 100644 fs/cifs_common/cifs_md4.c
create mode 100644 fs/cifs_common/md4.h
--
Thanks,
Steve
Powered by blists - more mailing lists