Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1213011pxa; Thu, 20 Aug 2020 05:50:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwuKXHe1yYRPatYXslq4qtQgn5wUnQlXbqf5y0y5G1r6r3REF1gzKP4hRrdUObMaB9Sla8i X-Received: by 2002:a17:907:40bf:: with SMTP id nu23mr3010098ejb.243.1597927811346; Thu, 20 Aug 2020 05:50:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597927811; cv=none; d=google.com; s=arc-20160816; b=IitrxV1SeVb1Yfx/uwMEf7NpxQx52fx2CB02HpH6gQUwZEA1mmBOG9hPwfs8Rt5WFu lA42+eOfsaQ8MOGad5+XsffP0/4bfFmjNSg9iOKL+9E0x41+y9Xb0tkzv67nGDsid5XT f43ka5pZIdo716iyZRw1n2zL8M837iyvw3unEC4K/L0bLU/36quN/gcu5Yqhoihil9t8 UtozT7zzE0iR7MvkEPbeckcrE9KWtOZJuZ/xstCs+tgBdzlar6RSlo6tdT8ta5CqKNIU b7Z3J+qbTXB8xjZ6MC1qGqNBFmzBfjWNRQzRGpDbaNkinbKQ40bdd+2+rz4RgdzUhfv3 pOLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=i96fNSp2QSSiN0iHDCN2KEWie7rndlStZ8fqQonUK/I=; b=e03NT91QuipXaaKWHY+MtebCrH+h1M4RmL5Evc4tp7R6GjTzMIkwwQux4BfPBfhEb+ HJDMSNnmNO0FGAaD60/fvm9N4gx81N/su0RX16dOrGD2TEjvQkz38AfKsDc3XTAvk6ns kL2PFnFMHfCctMfDV9NOBLu7qMOujWF9EcvXQ1pC8v1btLb6n8rzpxVTCWcjXDlizDbb uWQ369InufHpW9wUzbo3G1lfUzWsjcxp1U0oEpTJQcJ1ocgYHofd7fGnb6pchZzuqmwr lccFLAPu9DphAMpjOp7VprqTYzPDYmgBz4bunNqPYUle+VowaMpUh8Vcvu9Za6kSp5ut MjJA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZPNPvU1y; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p5si1228443edp.481.2020.08.20.05.49.47; Thu, 20 Aug 2020 05:50:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZPNPvU1y; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728667AbgHTMtT (ORCPT + 99 others); Thu, 20 Aug 2020 08:49:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:45788 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729201AbgHTJpQ (ORCPT ); Thu, 20 Aug 2020 05:45:16 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A2ACF22D0B; Thu, 20 Aug 2020 09:44:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1597916679; bh=CBItiV+ncK2sEwjebH3R9xKeqirIkCsYTLz+7WjFaA0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ZPNPvU1yDZK+sckG18DRfMWQYvwrssey6Me6oZOT88lngfRtBwBJ67euJ8kTdzUUH qqJMwdMYxz77Wx/uspEENTqASm9ly5ZfXnY+1fjqtd/qopqatQozIgF6R4fL1RxfOz +9ndgfinTbyzia8fqV6RLSniFh9NHWaF+maZTJdc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Steve French Subject: [PATCH 5.4 001/152] smb3: warn on confusing error scenario with sec=krb5 Date: Thu, 20 Aug 2020 11:19:28 +0200 Message-Id: <20200820091553.699874152@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200820091553.615456912@linuxfoundation.org> References: <20200820091553.615456912@linuxfoundation.org> User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Steve French commit 0a018944eee913962bce8ffebbb121960d5125d9 upstream. When mounting with Kerberos, users have been confused about the default error returned in scenarios in which either keyutils is not installed or the user did not properly acquire a krb5 ticket. Log a warning message in the case that "ENOKEY" is returned from the get_spnego_key upcall so that users can better understand why mount failed in those two cases. CC: Stable Signed-off-by: Steve French Signed-off-by: Greg Kroah-Hartman --- fs/cifs/smb2pdu.c | 2 ++ 1 file changed, 2 insertions(+) --- a/fs/cifs/smb2pdu.c +++ b/fs/cifs/smb2pdu.c @@ -1323,6 +1323,8 @@ SMB2_auth_kerberos(struct SMB2_sess_data spnego_key = cifs_get_spnego_key(ses); if (IS_ERR(spnego_key)) { rc = PTR_ERR(spnego_key); + if (rc == -ENOKEY) + cifs_dbg(VFS, "Verify user has a krb5 ticket and keyutils is installed\n"); spnego_key = NULL; goto out; }