Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1100963pxa; Thu, 20 Aug 2020 02:28:02 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwEa4GPkXe6dV5lsIZFSGIlU96Zav/lD30En/DJ5K9sliJAz/SnYZoa6bLxa9wdqDbsCfeB X-Received: by 2002:aa7:d948:: with SMTP id l8mr2000351eds.371.1597915682197; Thu, 20 Aug 2020 02:28:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597915682; cv=none; d=google.com; s=arc-20160816; b=j9IuwfNOBXQW3MHi5gzST26MqDp9yskTi1sOuIIoLZujktQZER8rBp3bepqH0/DwOZ /Ut3fWSg+kMtR7hw0qYmB2GUr4NCaWgtoEE7FxjPGpjst6Ex1cbDhWmWZBpqx+8/y8iq KhXsDJ4j/gTgVI++7rvZV4d2fshEmh8RAd8jO3EaNiERQVlrZdPX2hESeN3P5VaSXHua g8km1C16JNWvj+UhjzAVckKrOW/xT0hh5mVTephOTp4aF8F2WYLhpsRe834WG4D3lt0+ Gj99B49u9eXalZ/wV6eu9bpTcKQjQrVrETwIxJ4odcwA6T5onXbcTAARaVywgSqt3i/G 1/fA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=VJkH7EZAlm9wCglQdOURhjKbanQIbygcyGWclNxFvPI=; b=xGSQugJg20Zcx+DQFssU8hCM7kX/FfLdzLBwwRmWP+g7g4x1ZBtmgPeqcQO8pI4fWi wfw/NGqUcxCZ1HCHwPx7P7KYlmNtq1eo5AEJN+qP+RVHZZSAgzTgHtCiIVjtP8WGvoYp ccEt2LFBv9Su+N/g0iyWR7cya2LQGwWf1COIGFSAtr7CyfuzLDVN1IbiNYIdhM6L3ivI VfgEoKvZl1PzTAGTucEK/ibGI7E2FVpCGTHvTU5n29RBftVZBSftw8T6esFUloY/yjfT aw2s/HyE0h/ylD59f687uP91AyQZQ3ALzpB8lbeEHYAFvYXZc+LIrWsgeeUGpt4RufrR xoFQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=X3nF1wx6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r17si879681eji.277.2020.08.20.02.27.38; Thu, 20 Aug 2020 02:28:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=X3nF1wx6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726978AbgHTJYd (ORCPT + 99 others); Thu, 20 Aug 2020 05:24:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:59916 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726912AbgHTJYQ (ORCPT ); Thu, 20 Aug 2020 05:24:16 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3A1F022CE3; Thu, 20 Aug 2020 09:24:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1597915455; bh=sy/Uz6UT4Qh47LrCSZBXGxfv/cPwQ3qmUJiBgcdvSBw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=X3nF1wx6lGCKQ5CdeSawk3K+YTuOCbewtQ3TiDHb6dcEhxYBHk93LA1QMACV6K9Sa qW6HNNVUFOvJwy4lxsGtPuvQ5bfzxjAcyDlgNo/lqPAF6vuyqxbDuG97FSrOZxn0dO pXSLhZx7plFQ2aif+KsD4oJIqHuZty34k6m6/xIc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Steve French Subject: [PATCH 5.8 002/232] smb3: warn on confusing error scenario with sec=krb5 Date: Thu, 20 Aug 2020 11:17:33 +0200 Message-Id: <20200820091612.821749452@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200820091612.692383444@linuxfoundation.org> References: <20200820091612.692383444@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Steve French commit 0a018944eee913962bce8ffebbb121960d5125d9 upstream. When mounting with Kerberos, users have been confused about the default error returned in scenarios in which either keyutils is not installed or the user did not properly acquire a krb5 ticket. Log a warning message in the case that "ENOKEY" is returned from the get_spnego_key upcall so that users can better understand why mount failed in those two cases. CC: Stable Signed-off-by: Steve French Signed-off-by: Greg Kroah-Hartman --- fs/cifs/smb2pdu.c | 2 ++ 1 file changed, 2 insertions(+) --- a/fs/cifs/smb2pdu.c +++ b/fs/cifs/smb2pdu.c @@ -1387,6 +1387,8 @@ SMB2_auth_kerberos(struct SMB2_sess_data spnego_key = cifs_get_spnego_key(ses); if (IS_ERR(spnego_key)) { rc = PTR_ERR(spnego_key); + if (rc == -ENOKEY) + cifs_dbg(VFS, "Verify user has a krb5 ticket and keyutils is installed\n"); spnego_key = NULL; goto out; }