1. 16 Jul, 2021 1 commit
  2. 14 Jul, 2021 1 commit
  3. 25 Jun, 2021 1 commit
    • Steve French's avatar
      smb3: prevent races updating CurrentMid · 0fa757b5
      Steve French authored
      
      
      There was one place where we weren't locking CurrentMid, and although
      likely to be safe since even without the lock since it is during
      negotiate protocol, it is more consistent to lock it in this last remaining
      place, and avoids confusing Coverity warning.
      
      Addresses-Coverity: 1486665 ("Data race condition")
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      0fa757b5
  4. 21 Jun, 2021 2 commits
    • Thiago Rafael Becker's avatar
      cifs: retry lookup and readdir when EAGAIN is returned. · 6efa994e
      Thiago Rafael Becker authored
      According to the investigation performed by Jacob Shivers at Red Hat,
      cifs_lookup and cifs_readdir leak EAGAIN when the user session is
      deleted on the server. Fix this issue by implementing a retry with
      limits, as is implemented in cifs_revalidate_dentry_attr.
      
      Reproducer based on the work by Jacob Shivers:
      
        ~~~
        $ cat readdir-cifs-test.sh
        #!/bin/bash
      
        # Install and configure powershell and sshd on the windows
        #  server as descibed in
        # https://docs.microsoft.com/en-us/windows-server/administration/openssh/openssh_overview
      
      
        # This script uses expect(1)
      
        USER=dude
        SERVER=192.168.0.2
        RPATH=root
        PASS='password'
      
        function debug_funcs {
        	for line in $@ ; do
        		echo "func $line +p" > /sys/kernel/debug/dynamic_debug/control
        	done
        }
      
        function setup {
        	echo 1 > /proc/fs/cifs/cifsFYI
        	debug_funcs wait_for_compound_request \
                      smb2_query_dir_first cifs_readdir \
                      compound_send_recv cifs_reconnect_tcon \
                      generic_ip_connect cifs_reconnect \
                      smb2_reconnect_server smb2_reconnect \
                      cifs_readv_from_socket cifs_readv_receive
        	tcpdump -i eth0 -w cifs.pcap host 192.168.2.182 & sleep 5
        	dmesg -C
        }
      
        function test_call {
        	if [[ $1 == 1 ]] ; then
        		tracer="strace -tt -f -s 4096 -o trace-$(date -Iseconds).txt"
        	fi
              # Change the command here to anything appropriate
        	$tracer ls $2 > /dev/null
        	res=$?
        	if [[ $1 == 1 ]] ; then
        		if [[ $res == 0 ]] ; then
        			1>&2 echo success
        		else
        			1>&2 echo "failure ($res)"
        		fi
        	fi
        }
      
        mountpoint /mnt > /dev/null || mount -t cifs -o username=$USER,pass=$PASS //$SERVER/$RPATH /mnt
      
        test_call 0 /mnt/
      
        /usr/bin/expect << EOF
        	set timeout 60
      
        	spawn ssh $USER@$SERVER
      
        	expect "yes/no" {
        		send "yes\r"
        		expect "*?assword" { send "$PASS\r" }
        	} "*?assword" { send "$PASS\r" }
      
        	expect ">" { send "powershell close-smbsession -force\r" }
        	expect ">" { send "exit\r" }
        	expect eof
        EOF
      
        sysctl -w vm.drop_caches=2 > /dev/null
        sysctl -w vm.drop_caches=2 > /dev/null
      
        setup
      
        test_call 1 /mnt/
        ~~~
      Signed-off-by: default avatarThiago Rafael Becker <trbecker@gmail.com>
      Acked-by: default avatarRonnie Sahlberg <lsahlber@redhat.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      6efa994e
    • Ronnie Sahlberg's avatar
      cifs: improve fallocate emulation · 966a3cb7
      Ronnie Sahlberg authored
      
      
      RHBZ: 1866684
      
      We don't have a real fallocate in the SMB2 protocol so we used to emulate fallocate
      by simply switching the file to become non-sparse. But as that could potantially consume
      a lot more data than we intended to fallocate (large sparse file and fallocating a thin
      slice in the middle) we would only do this IFF the fallocate request was for virtually
      the entire file.
      
      This patch improves this and starts allowing us to fallocate smaller chunks of a file by
      overwriting the region with 0, for the parts that are unallocated.
      
      The method used is to first query the server for FSCTL_QUERY_ALLOCATED_RANGES to find what
      is unallocated in the fallocate range and then to only overwrite-with-zero the unallocated
      ranges to fill in the holes.
      
      As overwriting-with-zero is different from just allocating blocks, and potentially much
      more expensive, we limit this to only allow fallocate ranges up to 1Mb in size.
      Reported-by: default avatarkernel test robot <lkp@intel.com>
      Signed-off-by: default avatarRonnie Sahlberg <lsahlber@redhat.com>
      Acked-by: default avatarAurelien Aptel <aaptel@suse.com>
      Acked-by: default avatarPaulo Alcantara (SUSE) <pc@cjr.nz>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      966a3cb7
  5. 20 May, 2021 2 commits
  6. 25 Apr, 2021 17 commits
    • Steve French's avatar
      smb3: limit noisy error · 423333bc
      Steve French authored
      
      
      For servers which don't support copy_range (SMB3 CopyChunk), the
      logging of:
       CIFS: VFS: \\server\share refcpy ioctl error -95 getting resume key
      can fill the client logs and make debugging real problems more
      difficult.  Change the -EOPNOTSUPP on copy_range to a "warn once"
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      423333bc
    • Muhammad Usama Anjum's avatar
      cifs: remove unnecessary copies of tcon->crfid.fid · ad7567bc
      Muhammad Usama Anjum authored
      pfid is being set to tcon->crfid.fid and they are copied in each other
      multiple times. Remove the memcopy between same pointers - memory
      locations.
      
      Addresses-Coverity: ("Overlapped copy")
      Fixes: 9e81e8ff
      
       ("cifs: return cached_fid from open_shroot")
      Signed-off-by: default avatarMuhammad Usama Anjum <musamaanjum@gmail.com>
      Reviewed-by: default avatarAurelien Aptel <aaptel@suse.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      ad7567bc
    • Paul Aurich's avatar
      cifs: Return correct error code from smb2_get_enc_key · 83728cbf
      Paul Aurich authored
      Avoid a warning if the error percolates back up:
      
      [440700.376476] CIFS VFS: \\otters.example.com crypt_message: Could not get encryption key
      [440700.386947] ------------[ cut here ]------------
      [440700.386948] err = 1
      [440700.386977] WARNING: CPU: 11 PID: 2733 at /build/linux-hwe-5.4-p6lk6L/linux-hwe-5.4-5.4.0/lib/errseq.c:74 errseq_set+0x5c/0x70
      ...
      [440700.397304] CPU: 11 PID: 2733 Comm: tar Tainted: G           OE     5.4.0-70-generic #78~18.04.1-Ubuntu
      ...
      [440700.397334] Call Trace:
      [440700.397346]  __filemap_set_wb_err+0x1a/0x70
      [440700.397419]  cifs_writepages+0x9c7/0xb30 [cifs]
      [440700.397426]  do_writepages+0x4b/0xe0
      [440700.397444]  __filemap_fdatawrite_range+0xcb/0x100
      [440700.397455]  filemap_write_and_wait+0x42/0xa0
      [440700.397486]  cifs_setattr+0x68b/0xf30 [cifs]
      [440700.397493]  notify_change+0x358/0x4a0
      [440700.397500]  utimes_common+0xe9/0x1c0
      [440700.397510]  do_utimes+0xc5/0x150
      [440700.397520]  __x64_sys_utimensat+0x88/0xd0
      
      Fixes: 61cfac6f
      
       ("CIFS: Fix possible use after free in demultiplex thread")
      Signed-off-by: default avatarPaul Aurich <paul@darkrain42.org>
      CC: stable@vger.kernel.org
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      83728cbf
    • Eugene Korenevsky's avatar
      cifs: fix out-of-bound memory access when calling smb3_notify() at mount point · a637f4ae
      Eugene Korenevsky authored
      If smb3_notify() is called at mount point of CIFS, build_path_from_dentry()
      returns the pointer to kmalloc-ed memory with terminating zero (this is
      empty FileName to be passed to SMB2 CREATE request). This pointer is assigned
      to the `path` variable.
      Then `path + 1` (to skip first backslash symbol) is passed to
      cifs_convert_path_to_utf16(). This is incorrect for empty path and causes
      out-of-bound memory access.
      
      Get rid of this "increase by one". cifs_convert_path_to_utf16() already
      contains the check for leading backslash in the path.
      
      BugLink: https://bugzilla.kernel.org/show_bug.cgi?id=212693
      
      
      CC: <stable@vger.kernel.org> # v5.6+
      Signed-off-by: default avatarEugene Korenevsky <ekorenevsky@astralinux.ru>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      a637f4ae
    • Aurelien Aptel's avatar
      smb2: fix use-after-free in smb2_ioctl_query_info() · ccd48ec3
      Aurelien Aptel authored
      
      
      * rqst[1,2,3] is allocated in vars
      * each rqst->rq_iov is also allocated in vars or using pooled memory
      
      SMB2_open_free, SMB2_ioctl_free, SMB2_query_info_free are iterating on
      each rqst after vars has been freed (use-after-free), and they are
      freeing the kvec a second time (double-free).
      
      How to trigger:
      
      * compile with KASAN
      * mount a share
      
      $ smbinfo quota /mnt/foo
      Segmentation fault
      $ dmesg
      
       ==================================================================
       BUG: KASAN: use-after-free in SMB2_open_free+0x1c/0xa0
       Read of size 8 at addr ffff888007b10c00 by task python3/1200
      
       CPU: 2 PID: 1200 Comm: python3 Not tainted 5.12.0-rc6+ #107
       Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.14.0-0-g155821a-rebuilt.opensuse.org 04/01/2014
       Call Trace:
        dump_stack+0x93/0xc2
        print_address_description.constprop.0+0x18/0x130
        ? SMB2_open_free+0x1c/0xa0
        ? SMB2_open_free+0x1c/0xa0
        kasan_report.cold+0x7f/0x111
        ? smb2_ioctl_query_info+0x240/0x990
        ? SMB2_open_free+0x1c/0xa0
        SMB2_open_free+0x1c/0xa0
        smb2_ioctl_query_info+0x2bf/0x990
        ? smb2_query_reparse_tag+0x600/0x600
        ? cifs_mapchar+0x250/0x250
        ? rcu_read_lock_sched_held+0x3f/0x70
        ? cifs_strndup_to_utf16+0x12c/0x1c0
        ? rwlock_bug.part.0+0x60/0x60
        ? rcu_read_lock_sched_held+0x3f/0x70
        ? cifs_convert_path_to_utf16+0xf8/0x140
        ? smb2_check_message+0x6f0/0x6f0
        cifs_ioctl+0xf18/0x16b0
        ? smb2_query_reparse_tag+0x600/0x600
        ? cifs_readdir+0x1800/0x1800
        ? selinux_bprm_creds_for_exec+0x4d0/0x4d0
        ? do_user_addr_fault+0x30b/0x950
        ? __x64_sys_openat+0xce/0x140
        __x64_sys_ioctl+0xb9/0xf0
        do_syscall_64+0x33/0x40
        entry_SYSCALL_64_after_hwframe+0x44/0xae
       RIP: 0033:0x7fdcf1f4ba87
       Code: b3 66 90 48 8b 05 11 14 2c 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 13 2c 00 f7 d8 64 89 01 48
       RSP: 002b:00007ffef1ce7748 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
       RAX: ffffffffffffffda RBX: 00000000c018cf07 RCX: 00007fdcf1f4ba87
       RDX: 0000564c467c5590 RSI: 00000000c018cf07 RDI: 0000000000000003
       RBP: 00007ffef1ce7770 R08: 00007ffef1ce7420 R09: 00007fdcf0e0562b
       R10: 0000000000000100 R11: 0000000000000246 R12: 0000000000004018
       R13: 0000000000000001 R14: 0000000000000003 R15: 0000564c467c5590
      
       Allocated by task 1200:
        kasan_save_stack+0x1b/0x40
        __kasan_kmalloc+0x7a/0x90
        smb2_ioctl_query_info+0x10e/0x990
        cifs_ioctl+0xf18/0x16b0
        __x64_sys_ioctl+0xb9/0xf0
        do_syscall_64+0x33/0x40
        entry_SYSCALL_64_after_hwframe+0x44/0xae
      
       Freed by task 1200:
        kasan_save_stack+0x1b/0x40
        kasan_set_track+0x1c/0x30
        kasan_set_free_info+0x20/0x30
        __kasan_slab_free+0xe5/0x110
        slab_free_freelist_hook+0x53/0x130
        kfree+0xcc/0x320
        smb2_ioctl_query_info+0x2ad/0x990
        cifs_ioctl+0xf18/0x16b0
        __x64_sys_ioctl+0xb9/0xf0
        do_syscall_64+0x33/0x40
        entry_SYSCALL_64_after_hwframe+0x44/0xae
      
       The buggy address belongs to the object at ffff888007b10c00
        which belongs to the cache kmalloc-512 of size 512
       The buggy address is located 0 bytes inside of
        512-byte region [ffff888007b10c00, ffff888007b10e00)
       The buggy address belongs to the page:
       page:0000000044e14b75 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7b10
       head:0000000044e14b75 order:2 compound_mapcount:0 compound_pincount:0
       flags: 0x100000000010200(slab|head)
       raw: 0100000000010200 ffffea000015f500 0000000400000004 ffff888001042c80
       raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
       page dumped because: kasan: bad access detected
      
       Memory state around the buggy address:
        ffff888007b10b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
        ffff888007b10b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
       >ffff888007b10c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                          ^
        ffff888007b10c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
        ffff888007b10d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
       ==================================================================
      Signed-off-by: default avatarAurelien Aptel <aaptel@suse.com>
      CC: <stable@vger.kernel.org>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      ccd48ec3
    • Ronnie Sahlberg's avatar
      cifs: add FALLOC_FL_INSERT_RANGE support · 7fe6fe95
      Ronnie Sahlberg authored
      
      
      Emulated via server side copy and setsize for
      SMB3 and later. In the future we could compound
      this (and/or optionally use DUPLICATE_EXTENTS
      if supported by the server).
      Signed-off-by: default avatarRonnie Sahlberg <lsahlber@redhat.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      7fe6fe95
    • Ronnie Sahlberg's avatar
      cifs: add support for FALLOC_FL_COLLAPSE_RANGE · 5476b5dd
      Ronnie Sahlberg authored
      
      
      Emulated for SMB3 and later via server side copy
      and setsize. Eventually this could be compounded.
      Reported-by: default avatarkernel test robot <lkp@intel.com>
      Reported-by: default avatarDan Carpenter <dan.carpenter@oracle.com>
      Signed-off-by: default avatarRonnie Sahlberg <lsahlber@redhat.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      5476b5dd
    • Ronnie Sahlberg's avatar
      cifs: add a timestamp to track when the lease of the cached dir was taken · ed20f54a
      Ronnie Sahlberg authored
      
      
      and clear the timestamp when we receive a lease break.
      Signed-off-by: default avatarRonnie Sahlberg <lsahlber@redhat.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      ed20f54a
    • Ronnie Sahlberg's avatar
      cifs: add a function to get a cached dir based on its dentry · 6ef4e9cb
      Ronnie Sahlberg authored
      
      
      Needed for subsequent patches in the directory caching
      series.
      Signed-off-by: default avatarRonnie Sahlberg <lsahlber@redhat.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      6ef4e9cb
    • Ronnie Sahlberg's avatar
      cifs: Grab a reference for the dentry of the cached directory during the lifetime of the cache · 5e9c89d4
      Ronnie Sahlberg authored
      
      
      We need to hold both a reference for the root/superblock as well as the directory that we
      are caching. We need to drop these references before we call kill_anon_sb().
      
      At this point, the root and the cached dentries are always the same but this will change
      once we start caching other directories as well.
      Signed-off-by: default avatarRonnie Sahlberg <lsahlber@redhat.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      5e9c89d4
    • Ronnie Sahlberg's avatar
      cifs: store a pointer to the root dentry in cifs_sb_info once we have completed mounting the share · 269f67e1
      Ronnie Sahlberg authored
      
      
      And use this to only allow to take out a shared handle once the mount has completed and the
      sb becomes available.
      This will become important in follow up patches where we will start holding a reference to the
      directory dentry for the shared handle during the lifetime of the handle.
      Signed-off-by: default avatarRonnie Sahlberg <lsahlber@redhat.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      269f67e1
    • Ronnie Sahlberg's avatar
      cifs: rename the *_shroot* functions to *_cached_dir* · 45c0f1aa
      Ronnie Sahlberg authored
      
      
      These functions will eventually be used to cache any directory, not just the root
      so change the names.
      Signed-off-by: default avatarRonnie Sahlberg <lsahlber@redhat.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      45c0f1aa
    • Ronnie Sahlberg's avatar
      cifs: pass a path to open_shroot and check if it is the root or not · e6eb1950
      Ronnie Sahlberg authored
      
      
      Move the check for the directory path into the open_shroot() function
      but still fail for any non-root directories.
      This is preparation for later when we will start using the cache also
      for other directories than the root.
      Signed-off-by: default avatarRonnie Sahlberg <lsahlber@redhat.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      e6eb1950
    • Ronnie Sahlberg's avatar
      cifs: move the check for nohandlecache into open_shroot · 4df3d976
      Ronnie Sahlberg authored
      
      
      instead of doing it in the callsites for open_shroot.
      Signed-off-by: default avatarRonnie Sahlberg <lsahlber@redhat.com>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      4df3d976
    • Al Viro's avatar
      cifs: allocate buffer in the caller of build_path_from_dentry() · f6a9bc33
      Al Viro authored
      
      
      build_path_from_dentry() open-codes dentry_path_raw().  The reason
      we can't use dentry_path_raw() in there (and postprocess the
      result as needed) is that the callers of build_path_from_dentry()
      expect that the object to be freed on cleanup and the string to
      be used are at the same address.  That's painful, since the path
      is naturally built end-to-beginning - we start at the leaf and
      go through the ancestors, accumulating the pathname.
      
      Life would be easier if we left the buffer allocation to callers.
      It wouldn't be exact-sized buffer, but none of the callers keep
      the result for long - it's always freed before the caller returns.
      So there's no need to do exact-sized allocation; better use
      __getname()/__putname(), same as we do for pathname arguments
      of syscalls.  What's more, there's no need to do allocation under
      spinlocks, so GFP_ATOMIC is not needed.
      
      Next patch will replace the open-coded dentry_path_raw() (in
      build_path_from_dentry_optional_prefix()) with calling the real
      thing.  This patch only introduces wrappers for allocating/freeing
      the buffers and switches to new calling conventions:
      	build_path_from_dentry(dentry, buf)
      expects buf to be address of a page-sized object or NULL,
      return value is a pathname built inside that buffer on success,
      ERR_PTR(-ENOMEM) if buf is NULL and ERR_PTR(-ENAMETOOLONG) if
      the pathname won't fit into page.  Note that we don't need to
      check for failure when allocating the buffer in the caller -
      build_path_from_dentry() will do the right thing.
      Signed-off-by: default avatarAl Viro <viro@zeniv.linux.org.uk>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      f6a9bc33
    • Al Viro's avatar
      cifs: make build_path_from_dentry() return const char * · 8e33cf20
      Al Viro authored
      
      
      ... and adjust the callers.
      Signed-off-by: default avatarAl Viro <viro@zeniv.linux.org.uk>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      8e33cf20
    • Al Viro's avatar
      55869139
  7. 26 Mar, 2021 2 commits
    • Steve French's avatar
      smb3: fix cached file size problems in duplicate extents (reflink) · cfc63fc8
      Steve French authored
      
      
      There were two problems (one of which could cause data corruption)
      that were noticed with duplicate extents (ie reflink)
      when debugging why various xfstests were being incorrectly skipped
      (e.g. generic/138, generic/140, generic/142). First, we were not
      updating the file size locally in the cache when extending a
      file due to reflink (it would refresh after actimeo expires)
      but xfstest was checking the size immediately which was still
      0 so caused the test to be skipped.  Second, we were setting
      the target file size (which could shrink the file) in all cases
      to the end of the reflinked range rather than only setting the
      target file size when reflink would extend the file.
      
      CC: <stable@vger.kernel.org>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      cfc63fc8
    • Shyam Prasad N's avatar
      cifs: Adjust key sizes and key generation routines for AES256 encryption · 45a4546c
      Shyam Prasad N authored
      
      
      For AES256 encryption (GCM and CCM), we need to adjust the size of a few
      fields to 32 bytes instead of 16 to accommodate the larger keys.
      
      Also, the L value supplied to the key generator needs to be changed from
      to 256 when these algorithms are used.
      
      Keeping the ioctl struct for dumping keys of the same size for now.
      Will send out a different patch for that one.
      Signed-off-by: default avatarShyam Prasad N <sprasad@microsoft.com>
      Reviewed-by: default avatarRonnie Sahlberg <lsahlber@redhat.com>
      CC: <stable@vger.kernel.org> # v5.10+
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      45a4546c
  8. 09 Mar, 2021 1 commit
    • Paulo Alcantara's avatar
      cifs: do not send close in compound create+close requests · 04ad69c3
      Paulo Alcantara authored
      
      
      In case of interrupted syscalls, prevent sending CLOSE commands for
      compound CREATE+CLOSE requests by introducing an
      CIFS_CP_CREATE_CLOSE_OP flag to indicate lower layers that it should
      not send a CLOSE command to the MIDs corresponding the compound
      CREATE+CLOSE request.
      
      A simple reproducer:
      
          #!/bin/bash
      
          mount //server/share /mnt -o username=foo,password=***
          tc qdisc add dev eth0 root netem delay 450ms
          stat -f /mnt &>/dev/null & pid=$!
          sleep 0.01
          kill $pid
          tc qdisc del dev eth0 root
          umount /mnt
      
      Before patch:
      
          ...
          6 0.256893470 192.168.122.2 → 192.168.122.15 SMB2 402 Create Request File: ;GetInfo Request FS_INFO/FileFsFullSizeInformation;Close Request
          7 0.257144491 192.168.122.15 → 192.168.122.2 SMB2 498 Create Response File: ;GetInfo Response;Close Response
          9 0.260798209 192.168.122.2 → 192.168.122.15 SMB2 146 Close Request File:
         10 0.260841089 192.168.122.15 → 192.168.122.2 SMB2 130 Close Response, Error: STATUS_FILE_CLOSED
      Signed-off-by: default avatarPaulo Alcantara (SUSE) <pc@cjr.nz>
      Reviewed-by: default avatarRonnie Sahlberg <lsahlber@redhat.com>
      Reviewed-by: default avatarAurelien Aptel <aaptel@suse.com>
      CC: <stable@vger.kernel.org>
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      04ad69c3
  9. 23 Feb, 2021 2 commits
  10. 16 Feb, 2021 2 commits
  11. 19 Dec, 2020 1 commit
  12. 18 Dec, 2020 1 commit
  13. 15 Dec, 2020 1 commit
  14. 14 Dec, 2020 3 commits
  15. 03 Dec, 2020 1 commit
  16. 16 Nov, 2020 2 commits