Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753106AbaB0PDa (ORCPT ); Thu, 27 Feb 2014 10:03:30 -0500 Received: from mail-pa0-f65.google.com ([209.85.220.65]:44303 "EHLO mail-pa0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752150AbaB0PD2 convert rfc822-to-8bit (ORCPT ); Thu, 27 Feb 2014 10:03:28 -0500 Date: Thu, 27 Feb 2014 07:03:24 -0800 From: Jeff Layton To: "Lorenz Bucher" Cc: sfrench@samba.org, linux-cifs@vger.kernel.org, samba-technical@lists.samba.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] cifs: connect: added option krb5mi which may allow package signing Message-ID: <20140227070324.0861fb3a@corrin.poochiereds.net> In-Reply-To: References: <20140226122634.1190167e@corrin.poochiereds.net> X-Mailer: Claws Mail 3.9.3 (GTK+ 2.24.22; x86_64-redhat-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 27 Feb 2014 10:13:14 +0100 "Lorenz Bucher" wrote: > >   >   > > Gesendet: Mittwoch, 26. Februar 2014 um 21:26 Uhr > Von: "Jeff Layton" > An: "Lorenz Bucher" > Cc: sfrench@samba.org, linux-cifs@vger.kernel.org, samba-technical@lists.samba.org, linux-kernel@vger.kernel.org > Betreff: Re: [PATCH] cifs: connect: added option krb5mi which may allow package signing > On Wed, 26 Feb 2014 14:46:47 +0100 > "Lorenz Bucher" wrote: > > > Solves an issue with dfs where servers using package signing are > > mixed with servers which don't use package signing. > > > > Signed-off-by: Lorenz Bucher > > --- > > fs/cifs/connect.c | 3 +++ > > 1 file changed, 3 insertions(+) > > > > diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c > > index 56c152d..9d06dd8 100644 > > --- a/fs/cifs/connect.c > > +++ b/fs/cifs/connect.c > > @@ -1104,6 +1104,9 @@ cifs_parse_mount_options(const char *mountdata, const char *devname, > > if (!value || !*value) { > > cERROR(1, "no security value specified"); > > continue; > > + } else if (strnicmp(value, "krb5mi", 6) == 0) { > > + vol->secFlg |= CIFSSEC_MAY_KRB5 | > > + CIFSSEC_MAY_SIGN; > > } else if (strnicmp(value, "krb5i", 5) == 0) { > > vol->secFlg |= CIFSSEC_MAY_KRB5 | > > CIFSSEC_MUST_SIGN; > > This looks like it applies to a really old kernel. I think that problem > was what commit 0b7bc84000d71f3647ca33ab1bf5bd928535c846 was intended > to fix. > > -- > Jeff Layton > > Its the current kernel from LTS Ubuntu 12.04 > 3.2.0-59-generic #90-Ubuntu SMP Tue Jan 7 22:43:51 UTC 2014 > Yep, that kernel is pretty old. You're probably best off asking the ubuntu kernel maintainers to take that patch (or asking them to backport 0b7bc84000d). It should be reasonably safe but they'll have to make that call. -- Jeff Layton -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/