diff options
author | Andy Adamson <andros@netapp.com> | 2014-06-09 15:33:20 -0400 |
---|---|---|
committer | Trond Myklebust <trond.myklebust@primarydata.com> | 2014-06-24 18:46:58 -0400 |
commit | 8445cd3528b21da77c41ad1372a944ef94d7516f (patch) | |
tree | 1f193e7df426b3c0e389a8043727e933877fa52e /fs/nfs | |
parent | 57bbe3d7c110fcc20a661cb814a401e4126ca590 (diff) |
NFS Return -EPERM if no supported or matching SECINFO flavor
Do not return RPC_AUTH_UNIX if SEINFO reply tests fail. This
prevents an infinite loop of NFS4ERR_WRONGSEC for non RPC_AUTH_UNIX mounts.
Without this patch, a mount with no sec= option to a server
that does not include RPC_AUTH_UNIX in the
SECINFO return can be presented with an attemtp to use RPC_AUTH_UNIX
which will result in an NFS4ERR_WRONG_SEC which will prompt the SECINFO
call which will again try RPC_AUTH_UNIX....
Signed-off-by: Andy Adamson <andros@netapp.com>
Tested-By: Steve Dickson <steved@redhat.com>
Signed-off-by: Trond Myklebust <trond.myklebust@primarydata.com>
Diffstat (limited to 'fs/nfs')
-rw-r--r-- | fs/nfs/nfs4namespace.c | 11 |
1 files changed, 4 insertions, 7 deletions
diff --git a/fs/nfs/nfs4namespace.c b/fs/nfs/nfs4namespace.c index 1b86fef0b828..fd4dcb67cd15 100644 --- a/fs/nfs/nfs4namespace.c +++ b/fs/nfs/nfs4namespace.c | |||
@@ -140,10 +140,11 @@ static size_t nfs_parse_server_name(char *string, size_t len, | |||
140 | * @flavors: List of security tuples returned by SECINFO procedure | 140 | * @flavors: List of security tuples returned by SECINFO procedure |
141 | * | 141 | * |
142 | * Return the pseudoflavor of the first security mechanism in | 142 | * Return the pseudoflavor of the first security mechanism in |
143 | * "flavors" that is locally supported. Return RPC_AUTH_UNIX if | 143 | * "flavors" that is locally supported. The "flavors" array |
144 | * no matching flavor is found in the array. The "flavors" array | ||
145 | * is searched in the order returned from the server, per RFC 3530 | 144 | * is searched in the order returned from the server, per RFC 3530 |
146 | * recommendation. | 145 | * recommendation. |
146 | * | ||
147 | * Return -EPERM if no matching flavor is found in the array. | ||
147 | */ | 148 | */ |
148 | static rpc_authflavor_t nfs_find_best_sec(struct nfs_server *server, | 149 | static rpc_authflavor_t nfs_find_best_sec(struct nfs_server *server, |
149 | struct nfs4_secinfo_flavors *flavors) | 150 | struct nfs4_secinfo_flavors *flavors) |
@@ -170,11 +171,7 @@ static rpc_authflavor_t nfs_find_best_sec(struct nfs_server *server, | |||
170 | } | 171 | } |
171 | } | 172 | } |
172 | 173 | ||
173 | /* if there were any sec= options then nothing matched */ | 174 | return -EPERM; |
174 | if (server->auth_info.flavor_len > 0) | ||
175 | return -EPERM; | ||
176 | |||
177 | return RPC_AUTH_UNIX; | ||
178 | } | 175 | } |
179 | 176 | ||
180 | static rpc_authflavor_t nfs4_negotiate_security(struct inode *inode, struct qstr *name) | 177 | static rpc_authflavor_t nfs4_negotiate_security(struct inode *inode, struct qstr *name) |