Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp1268226rdb; Wed, 6 Dec 2023 13:33:41 -0800 (PST) X-Google-Smtp-Source: AGHT+IF6/8WxhykgErEzX93OulfTUEeQ90zgArgPNcfp+4XA0cmPRV6Y/g5ay9RE6PxElZ97nSgM X-Received: by 2002:a17:903:2487:b0:1d0:6ffd:8369 with SMTP id p7-20020a170903248700b001d06ffd8369mr1121196plw.116.1701898421522; Wed, 06 Dec 2023 13:33:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701898421; cv=none; d=google.com; s=arc-20160816; b=gGG0qxi/DmJy4X2iZUzu21723ilYRiMSLJbjx7fsuXqiUdZl0KQ36BQYgo6ELNbMBS eepqmbVSZTpMMif3oZRAnQtglQuAgy8ev/Y1TxmrwAaVAu77V+Lcm+/19ya8RO2D+kh6 yGkd1pny4/N+lU8msfHXdhJCOUZNeUm1jP8HCamSFytamSoOktaJW/IDixQfx3RUU5qK 4snmnKjlXvhS887wwjwO1dVNkyHu0puJ8X0Bc75BbskcDboLCfKqwVEif8+lZjF0arHq rs1p/Ji0mDI5t0Dr3m/q2cyvIzLVCusOQ3er0KVN5B+uwHkzLXLbKJ72/zX62Tth4oUK /5pg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=GGkFOHXTx9A2Ch/09jIUlLvdwbwn/eW0b7s9NeYsh+Y=; fh=ZJPgNAZwOCbSyBfjFAqnBpYgRpjZ5EFFW6v1xl7kDFw=; b=jJP2OF256w3TO/3iWp3b6LO2ZbTLcI0bKgtH405V74SMH//6668DPCC5KY5gFjRdHk ya/vG5fPlFOUumZu8W+R4YYf0lsFuaaUx8CzwMOLtBHIg3OTAO/GMa1gSS9aXga1q4Wf ysEeg8pvpBsi8ZerFidP7pGDou2WR827mshltIPQy6dEVNnEh0bN/1x3ngpkldgJcBdK SwE1PmcwaW7KvyrY1pZuqUH6ACipSz3pwV01QCVH+SowSOF9mkmsxZi6B3kbvY8IsTnH LXFc9ow5eT7tGLtA120xwneYts4BLl4zHsf55k6XW9EA5eb9tRnOX5BILsJRQsUs7jUW ONew== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=eJwKrPYd; spf=pass (google.com: domain of linux-nfs+bounces-371-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-nfs+bounces-371-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id l1-20020a170903244100b001d0bdb270a7si422236pls.259.2023.12.06.13.33.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 06 Dec 2023 13:33:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-nfs+bounces-371-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=eJwKrPYd; spf=pass (google.com: domain of linux-nfs+bounces-371-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-nfs+bounces-371-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 76B17B20CF7 for ; Wed, 6 Dec 2023 21:33:40 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 440A870964; Wed, 6 Dec 2023 21:33:38 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="eJwKrPYd" X-Original-To: linux-nfs@vger.kernel.org Received: from mail-qt1-x82c.google.com (mail-qt1-x82c.google.com [IPv6:2607:f8b0:4864:20::82c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 18EC9D5F for ; Wed, 6 Dec 2023 13:33:35 -0800 (PST) Received: by mail-qt1-x82c.google.com with SMTP id d75a77b69052e-4258ca2ee9dso78251cf.1 for ; Wed, 06 Dec 2023 13:33:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1701898414; x=1702503214; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=GGkFOHXTx9A2Ch/09jIUlLvdwbwn/eW0b7s9NeYsh+Y=; b=eJwKrPYdHxiUtU92MJQipM9fE5Dg33k6kU3t5aMA1c9qPK6MsYdDFmTefMQNPUcSfb lsxhwCxrrPtU73PL668CidJDmU+VMqJHfIXZ7GSgtH15F0gBupExiNoHVAn0k801OIbz b/gK0qEr+1XLy67S64LSFtXdDYE0sD6N+MG4yuCTGAH7Q8Bk6j26TPwiuxRILjb/HttL r9B/enOdlZSJYEhbh6353ILjv/PWNLg2ot/+6wcv+AInqhtsej0jAbvql1i7sc54btkW j2WLvZ4zOV1xlF2Dx1gTKEbAzHP0uXy6R6JMbjQu/Ex5KQysLc7e7FTB8wU0T/EWo1Uj LzWQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1701898414; x=1702503214; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=GGkFOHXTx9A2Ch/09jIUlLvdwbwn/eW0b7s9NeYsh+Y=; b=h+dptZoFlgyHLMVMbvbhqPseFaKpOFr2MS9HQ1/I66wlRRJkoqWAMzfc6/GsGcgOWS e7opypcP4UOfZVHcwWEcplHi8897kzEuIBm1VDSDw0pH+cXBqWa94DecNirqjn5s7jql e1X0ayZT3nTgxlKzVkDO5tUnLjnljLF4DRP+rtn9Ic/xVbhfW6RJNp904IOrOC57xHHD v/FdpnR5NoxvXvc0PV6zwk8fTIqmAE3XHPn304kvxa+2KIYXgPf4xq6ZDo7ZpRETEJEc pUNAWK7IPPr03zw+rcsPbOawF1C23q7R/D74PLOc535wRjg7VYy2f+LiKM7tcz1SKFOE G0kQ== X-Gm-Message-State: AOJu0YzuF9Nj+vFLi1dVVRgFGGyrvPoVeUm0861DUkQPjWghFa7+Hsn2 r4bFgg/j2iNvmQFlUs/VdK8= X-Received: by 2002:a05:620a:1919:b0:77f:2baf:c969 with SMTP id bj25-20020a05620a191900b0077f2bafc969mr3003696qkb.6.1701898414060; Wed, 06 Dec 2023 13:33:34 -0800 (PST) Received: from kolga-mac-1.attlocal.net ([2600:1700:6a10:2e90:b4ac:108b:be40:79b]) by smtp.gmail.com with ESMTPSA id ro3-20020a05620a398300b0077da601f06csm256435qkn.10.2023.12.06.13.33.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 06 Dec 2023 13:33:33 -0800 (PST) From: Olga Kornievskaia To: steved@redhat.com Cc: linux-nfs@vger.kernel.org, chuck.lever@oracle.com Subject: [PATCH 0/6] nfs-utils: handle BAD_INTEGRITY ERROR Date: Wed, 6 Dec 2023 16:33:26 -0500 Message-Id: <20231206213332.55565-1-olga.kornievskaia@gmail.com> X-Mailer: git-send-email 2.30.1 (Apple Git-130) Precedence: bulk X-Mailing-List: linux-nfs@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit From: Olga Kornievskaia This patch series is re-work of the previous patch series that handles gss error for bad integrity. In this version, gssd is changed to use rpc_gss_seccreate() function in tirpc which exposes the gss errors to the caller. This functionality is further checked with configure for the presence of this function in the tirpc library. Note that the current libtirpc (1.3.4 version) needs a fix to rpc_gss_seccreate() to work correctly for the gssd that passes in credentials to be used for the gss context establishement. Olga Kornievskaia (6): gssd: revert commit a5f3b7ccb01c gssd: revert commit 513630d720bd gssd: switch to using rpc_gss_seccreate() gssd: handle KRB5_AP_ERR_BAD_INTEGRITY for machine credentials gssd: handle KRB5_AP_ERR_BAD_INTEGRITY for user credentials configure: check for rpc_gss_seccreate aclocal/libtirpc.m4 | 5 +++++ utils/gssd/gssd_proc.c | 26 +++++++++++++++++++++++--- 2 files changed, 28 insertions(+), 3 deletions(-) -- 2.39.1