Skip to content

Commit b139cd7

Browse files
author
Olga Kornievskaia
committed
nfsd: fix access checking for NLM under XPRTSEC policies
JIRA: https://issues.redhat.com/browse/RHEL-82689 commit 0813c5f Author: Olga Kornievskaia <okorniev@redhat.com> Date: Fri Mar 21 20:13:04 2025 -0400 nfsd: fix access checking for NLM under XPRTSEC policies When an export policy with xprtsec policy is set with "tls" and/or "mtls", but an NFS client is doing a v3 xprtsec=tls mount, then NLM locking calls fail with an error because there is currently no support for NLM with TLS. Until such support is added, allow NLM calls under TLS-secured policy. Fixes: 4cc9b9f ("nfsd: refine and rename NFSD_MAY_LOCK") Cc: stable@vger.kernel.org Signed-off-by: Olga Kornievskaia <okorniev@redhat.com> Reviewed-by: NeilBrown <neil@brown.name> Reviewed-by: Jeff Layton <jlayton@kernel.org> Signed-off-by: Chuck Lever <chuck.lever@oracle.com> Signed-off-by: Olga Kornievskaia <okorniev@redhat.com>
1 parent 1aaa411 commit b139cd7

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

fs/nfsd/export.c

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1130,7 +1130,8 @@ __be32 check_nfsd_access(struct svc_export *exp, struct svc_rqst *rqstp,
11301130
test_bit(XPT_PEER_AUTH, &xprt->xpt_flags))
11311131
goto ok;
11321132
}
1133-
goto denied;
1133+
if (!may_bypass_gss)
1134+
goto denied;
11341135

11351136
ok:
11361137
/* legacy gss-only clients are always OK: */

0 commit comments

Comments
 (0)