mirror of
https://github.com/adulau/aha.git
synced 2024-12-29 12:16:20 +00:00
sunrpc: fix code that makes auth_gss send destroy_cred message (try #2)
There's a bit of a chicken and egg problem when it comes to destroying auth_gss credentials. When we destroy the last instance of a GSSAPI RPC credential, we should send a NULL RPC call with a GSS procedure of RPCSEC_GSS_DESTROY to hint to the server that it can destroy those creds. This isn't happening because we're setting clearing the uptodate bit on the credentials and then setting the operations to the gss_nullops. When we go to do the RPC call, we try to refresh the creds. That fails with -EACCES and the call fails. Fix this by not clearing the UPTODATE bit for the credentials and adding a new crdestroy op for gss_nullops that just tears down the cred without trying to destroy the context. The only difference between this patch and the first one is the removal of some minor formatting deltas. Signed-off-by: Jeff Layton <jlayton@redhat.com> Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
This commit is contained in:
parent
64672d55d9
commit
6dcd3926b2
1 changed files with 12 additions and 5 deletions
|
@ -693,7 +693,7 @@ gss_destroying_context(struct rpc_cred *cred)
|
||||||
struct rpc_task *task;
|
struct rpc_task *task;
|
||||||
|
|
||||||
if (gss_cred->gc_ctx == NULL ||
|
if (gss_cred->gc_ctx == NULL ||
|
||||||
test_and_clear_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags) == 0)
|
test_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags) == 0)
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
gss_cred->gc_ctx->gc_proc = RPC_GSS_PROC_DESTROY;
|
gss_cred->gc_ctx->gc_proc = RPC_GSS_PROC_DESTROY;
|
||||||
|
@ -757,14 +757,12 @@ gss_free_cred_callback(struct rcu_head *head)
|
||||||
}
|
}
|
||||||
|
|
||||||
static void
|
static void
|
||||||
gss_destroy_cred(struct rpc_cred *cred)
|
gss_destroy_nullcred(struct rpc_cred *cred)
|
||||||
{
|
{
|
||||||
struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base);
|
struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base);
|
||||||
struct gss_auth *gss_auth = container_of(cred->cr_auth, struct gss_auth, rpc_auth);
|
struct gss_auth *gss_auth = container_of(cred->cr_auth, struct gss_auth, rpc_auth);
|
||||||
struct gss_cl_ctx *ctx = gss_cred->gc_ctx;
|
struct gss_cl_ctx *ctx = gss_cred->gc_ctx;
|
||||||
|
|
||||||
if (gss_destroying_context(cred))
|
|
||||||
return;
|
|
||||||
rcu_assign_pointer(gss_cred->gc_ctx, NULL);
|
rcu_assign_pointer(gss_cred->gc_ctx, NULL);
|
||||||
call_rcu(&cred->cr_rcu, gss_free_cred_callback);
|
call_rcu(&cred->cr_rcu, gss_free_cred_callback);
|
||||||
if (ctx)
|
if (ctx)
|
||||||
|
@ -772,6 +770,15 @@ gss_destroy_cred(struct rpc_cred *cred)
|
||||||
kref_put(&gss_auth->kref, gss_free_callback);
|
kref_put(&gss_auth->kref, gss_free_callback);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
gss_destroy_cred(struct rpc_cred *cred)
|
||||||
|
{
|
||||||
|
|
||||||
|
if (gss_destroying_context(cred))
|
||||||
|
return;
|
||||||
|
gss_destroy_nullcred(cred);
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Lookup RPCSEC_GSS cred for the current process
|
* Lookup RPCSEC_GSS cred for the current process
|
||||||
*/
|
*/
|
||||||
|
@ -1324,7 +1331,7 @@ static const struct rpc_credops gss_credops = {
|
||||||
|
|
||||||
static const struct rpc_credops gss_nullops = {
|
static const struct rpc_credops gss_nullops = {
|
||||||
.cr_name = "AUTH_GSS",
|
.cr_name = "AUTH_GSS",
|
||||||
.crdestroy = gss_destroy_cred,
|
.crdestroy = gss_destroy_nullcred,
|
||||||
.crbind = rpcauth_generic_bind_cred,
|
.crbind = rpcauth_generic_bind_cred,
|
||||||
.crmatch = gss_match,
|
.crmatch = gss_match,
|
||||||
.crmarshal = gss_marshal,
|
.crmarshal = gss_marshal,
|
||||||
|
|
Loading…
Reference in a new issue