linux_dsm_epyc7002/net/sunrpc/auth_gss
J. Bruce Fields 3c34ae11fa nfsd: fix krb5 handling of anonymous principals
krb5 mounts started failing as of
683428fae8 "sunrpc: Update svcgss xdr
handle to rpsec_contect cache".

The problem is that mounts are usually done with some host principal
which isn't normally mapped to any user, in which case svcgssd passes
down uid -1, which the kernel is then expected to map to the
export-specific anonymous uid or gid.

The new uid_valid/gid_valid checks were therefore causing that downcall
to fail.

(Note the regression may not have been seen with older userspace that
tended to map unknown principals to an anonymous id on their own rather
than leaving it to the kernel.)

Reviewed-by: "Eric W. Biederman" <ebiederm@xmission.com>
Signed-off-by: J. Bruce Fields <bfields@redhat.com>
2013-03-06 10:11:08 -05:00
..
auth_gss.c Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs 2013-02-26 20:16:07 -08:00
gss_generic_token.c
gss_krb5_crypto.c
gss_krb5_keys.c
gss_krb5_mech.c
gss_krb5_seal.c
gss_krb5_seqnum.c
gss_krb5_unseal.c
gss_krb5_wrap.c sunrpc: trim off trailing checksum before returning decrypted or integrity authenticated buffer 2013-02-08 15:19:10 -05:00
gss_mech_switch.c SUNRPC: Add missing static declaration to _gss_mech_get_by_name 2013-02-01 10:13:48 -05:00
Makefile
svcauth_gss.c nfsd: fix krb5 handling of anonymous principals 2013-03-06 10:11:08 -05:00