Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1235804pxa; Thu, 20 Aug 2020 06:23:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwuOzAYiMjD8Hv3/mw2uA3GsknuIpHwvGxJ0cD10xzDyDt9d0nkiSDVF4IB9aIB8U9uqWMV X-Received: by 2002:a50:8f85:: with SMTP id y5mr2861270edy.233.1597929823637; Thu, 20 Aug 2020 06:23:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597929823; cv=none; d=google.com; s=arc-20160816; b=kebFqe0cKEHG5m+GlhOTO1wCHsk+rW00L+4YspiSEs9NuluujsVVNBxSXkxn94u5YN xU2m7iy/UjuQhk7kK4XxgVo5R7ay1NoK3pqP7ngr5M7JodLIZX0NrnsEcYQXvjmUrAjA y+qeMpS/UiJgqH2oOlklf9mvPDrUggaukzVURPeS05FlA+bkLZeHJl5Ah1lgJJFcKUR4 oPSgoK/CiSAEFipg9BBvLtR6aXltEMqO99p1q7DfhfP2JeVySSfiJ7lZbWYLzTFiaoYL hfpo+Wj1paho08wMF26wf7YUjpfQCq0jI/Ut9W+5zar818H6ohFpflCqBd/rdXtUi/od WbfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=8RaCaGH797RnSXxSecIoeaBzYpyA8Ntzte83bK/kUQM=; b=ybltX4GG6H1DnIE2sX44E3bCa2Jh0/jO/tkaKI/7xC/F8DoyllUgMgGj1+7WAO6m7l OghHbk98+SU/UZySr4Y4TLSglDjrxp6hXJenXJgs45FsL9YK6DF8JmalxCTal+vXv8mF hrs9SWZiUqMSVMyu7S3whbvK12iw/pzlyut3UHS0SZnVzXsa51F3kNNXrlM9oHjidTix HrQp0JmflQ4BLvCdwDbqv7YhsRaSY+o81I6Ay+kIBS8rGcee22+WhVS8mWipNaQv9Q70 kWhnd5fjAPSAzzpSDmshEHLg4ycqC9cljrBrBXwfxAoTt2TeKlLa11sPr2iSeP7tC0hu mPKg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tGRqhlHm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 96si54776edq.405.2020.08.20.06.23.18; Thu, 20 Aug 2020 06:23:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tGRqhlHm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729827AbgHTNUd (ORCPT + 99 others); Thu, 20 Aug 2020 09:20:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:47984 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728068AbgHTJex (ORCPT ); Thu, 20 Aug 2020 05:34:53 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 29BD922B4B; Thu, 20 Aug 2020 09:34:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1597916092; bh=zvFkWaCytbHCWpM+M7cUA2j0g7DnlWbkOTrUhktlVdE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tGRqhlHm59/baCCRFWr69tFbuL7DSj+DdwQsRP2noOTZ3JyoAXEK0KDJpO/w9djZW 9hvsohbUdx4i+zM+25YOP5Dtkx0gbjF7w4b+PO85Xl64PrSdKF31usZ/+SeJYYVrOA h7Gs+MIPwX7no4Ftzi+zUStZd8QxWUDDId3n25Ek= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Steve French Subject: [PATCH 5.7 001/204] smb3: warn on confusing error scenario with sec=krb5 Date: Thu, 20 Aug 2020 11:18:18 +0200 Message-Id: <20200820091606.268388001@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200820091606.194320503@linuxfoundation.org> References: <20200820091606.194320503@linuxfoundation.org> User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Steve French commit 0a018944eee913962bce8ffebbb121960d5125d9 upstream. When mounting with Kerberos, users have been confused about the default error returned in scenarios in which either keyutils is not installed or the user did not properly acquire a krb5 ticket. Log a warning message in the case that "ENOKEY" is returned from the get_spnego_key upcall so that users can better understand why mount failed in those two cases. CC: Stable Signed-off-by: Steve French Signed-off-by: Greg Kroah-Hartman --- fs/cifs/smb2pdu.c | 2 ++ 1 file changed, 2 insertions(+) --- a/fs/cifs/smb2pdu.c +++ b/fs/cifs/smb2pdu.c @@ -1347,6 +1347,8 @@ SMB2_auth_kerberos(struct SMB2_sess_data spnego_key = cifs_get_spnego_key(ses); if (IS_ERR(spnego_key)) { rc = PTR_ERR(spnego_key); + if (rc == -ENOKEY) + cifs_dbg(VFS, "Verify user has a krb5 ticket and keyutils is installed\n"); spnego_key = NULL; goto out; }