Re: [PATCH] SUNRPC: Clean up the RPCSEC_GSS service ticket requests

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Jan 23, 2012 at 11:56:03AM -0500, Bryan Schumaker wrote:
> On Mon Jan 23 11:51:24 2012, Bruce Fields wrote:
> > On Tue, Jan 03, 2012 at 11:55:44AM -0500, Bruce Fields wrote:
> >> On Tue, Jan 03, 2012 at 11:41:47AM -0500, Trond Myklebust wrote:
> >>> Instead of hacking specific service names into gss_encode_v1_msg, we should
> >>> just allow the caller to specify the service name explicitly.
> >>
> >> Just curious: do you have some callers in mind he will need different
> >> service names?
> >>
> >> (But I agree reagardless that this is the more logical layering; fwiw:
> >>
> >> 	Acked-by: J. Bruce Fields <bfields@xxxxxxxxxx>
> >
> > Bah, is that what I get for acking without testing?  (Do Bryan's tests not do a
> > krb5 mount?)
> 
> I don't have kerberos set up on our test machines right now, and my 
> Jenkins scripts don't have parameters for mounting with alternate 
> security flavors.  I'll add it to my TODO list to make sure these cases 
> are tested, too.

I think that would be really useful.

(My regular connectathon tests are in bin/d-cthon in
git://linux-nfs.org/~bfields/testd.git.  I think it's totally
uninteresting--just a bunch of "mount; run cthon; umount", basically,
but feel free to look.  I currently do one cthon run on the client's
local filesystem just to catch anything really dumb, then run it over
v4, v3, v4/krb5, v3/krb5, v4/krb5i, v4/krb5p, v4.1, and v4.1/krb5.

Oh, and what looks like a bizarre module-loading race makes my krb5
mounts fail occasionally.  I haven't figured out how it's happening
yet....)

--b.

> 
> - Bryan
> 
> >
> > Not sure where the bug is, except on a quick look auth_cred got a princpal
> > argument, but I can't tell whether it's always initialized.
> >
> > --b.
> >
> > general protection fault: 0000 [#1] PREEMPT SMP 
> > CPU 0 
> > Modules linked in: rpcsec_gss_krb5 nfs nfsd lockd nfs_acl auth_rpcgss sunrpc [last unloaded: scsi_wait_scan]
> >
> > Pid: 6645, comm: 192.168.122.11- Not tainted 3.2.0-00001-g68c9715 #966 Bochs Bochs
> > RIP: 0010:[<ffffffff81516399>]  [<ffffffff81516399>] strnlen+0x9/0x40
> > RSP: 0018:ffff8800376b77d0  EFLAGS: 00010286
> > RAX: ffffffff81d027fc RBX: ffff88003758e398 RCX: ffffffffff0a0004
> > RDX: 5a5a5a5a5a5a5a5a RSI: ffffffffffffffff RDI: 5a5a5a5a5a5a5a5a
> > RBP: ffff8800376b77d0 R08: 000000000000fffb R09: 0000ffffffffff0a
> > R10: 0000000000000001 R11: 0000000000000000 R12: ffff8800b758e38f
> > R13: 5a5a5a5a5a5a5a5a R14: ffffffffffffffff R15: 00000000ffffffff
> > FS:  0000000000000000(0000) GS:ffff88003fc00000(0000) knlGS:0000000000000000
> > CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
> > CR2: 00000000004073e0 CR3: 0000000001e05000 CR4: 00000000000006f0
> > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> > DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> > Process 192.168.122.11- (pid: 6645, threadinfo ffff8800376b6000, task ffff88003b576080)
> > Stack:
> >  ffff8800376b7820 ffffffff815179ef ffff8800376b7800 ffffffff81097110
> >  ffff8800376b7810 ffff88003758e398 ffffffffa00524f9 ffffffffa00524f7
> >  ffff8800376b78a0 ffff8800b758e38f ffff8800376b7890 ffffffff81518b6a
> > Call Trace:
> >  [<ffffffff815179ef>] string+0x4f/0xf0
> >  [<ffffffff81097110>] ? is_module_address+0x30/0x60
> >  [<ffffffff81518b6a>] vsnprintf+0x1da/0x5b0
> >  [<ffffffff81088964>] ? static_obj+0x44/0x60
> >  [<ffffffff81518f80>] sprintf+0x40/0x50
> >  [<ffffffffa004d938>] gss_setup_upcall+0x1d8/0x2d0 [auth_rpcgss]
> >  [<ffffffffa004dcc3>] gss_cred_init+0xc3/0x3a0 [auth_rpcgss]
> >  [<ffffffffa000c3ac>] ? rpcauth_lookup_credcache+0x21c/0x2c0 [sunrpc]
> >  [<ffffffff81077500>] ? wake_up_bit+0x40/0x40
> >  [<ffffffff81950afd>] ? sub_preempt_count+0x9d/0xd0
> >  [<ffffffffa000c327>] rpcauth_lookup_credcache+0x197/0x2c0 [sunrpc]
> >  [<ffffffffa000c190>] ? rpcauth_refreshcred+0x1d0/0x1d0 [sunrpc]
> >  [<ffffffff8105b1a2>] ? local_bh_enable_ip+0x82/0x100
> >  [<ffffffffa004c5ce>] gss_lookup_cred+0xe/0x10 [auth_rpcgss]
> >  [<ffffffffa000cdbf>] generic_bind_cred+0x1f/0x30 [sunrpc]
> >  [<ffffffffa000c061>] rpcauth_refreshcred+0xa1/0x1d0 [sunrpc]
> >  [<ffffffffa00006d3>] call_refresh+0x43/0x70 [sunrpc]
> >  [<ffffffffa000a8c6>] __rpc_execute+0x66/0x2b0 [sunrpc]
> >  [<ffffffff810774ef>] ? wake_up_bit+0x2f/0x40
> >  [<ffffffffa000ab53>] rpc_execute+0x43/0x50 [sunrpc]
> >  [<ffffffffa0002315>] rpc_run_task+0x75/0x90 [sunrpc]
> >  [<ffffffffa0002432>] rpc_call_sync+0x42/0x70 [sunrpc]
> >  [<ffffffffa00e5a1f>] nfs4_proc_setclientid+0x1af/0x210 [nfs]
> >  [<ffffffffa00f2e17>] nfs4_init_clientid+0xc7/0x130 [nfs]
> >  [<ffffffff8194d55b>] ? _raw_spin_unlock_irq+0x3b/0x60
> >  [<ffffffffa00f24dd>] nfs4_run_state_manager+0x2ad/0x600 [nfs]
> >  [<ffffffffa00f2230>] ? nfs4_do_reclaim+0x590/0x590 [nfs]
> >  [<ffffffff81076fc6>] kthread+0x96/0xa0
> >  [<ffffffff81955bf4>] kernel_thread_helper+0x4/0x10
> >  [<ffffffff81046548>] ? finish_task_switch+0x88/0xf0
> >  [<ffffffff8194d961>] ? retint_restore_args+0xe/0xe
> >  [<ffffffff81076f30>] ? __init_kthread_worker+0x70/0x70
> >  [<ffffffff81955bf0>] ? gs_change+0xb/0xb
> > Code: 66 90 48 83 c2 01 80 3a 00 75 f7 48 89 d0 48 29 f8 c9 c3 66 66 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 55 48 85 f6 48 89 e5 74 2e <80> 3f 00 74 29 48 83 ee 01 48 89 f8 eb 12 66 0f 1f 84 00 00 00 
> > RIP  [<ffffffff81516399>] strnlen+0x9/0x40
> >  RSP <ffff8800376b77d0>
> > ---[ end trace bff324891ae17805 ]---
> >
> >
> >>
> >> .)
> >>
> >> --b.
> >>
> >>>
> >>> Signed-off-by: Trond Myklebust <Trond.Myklebust@xxxxxxxxxx>
> >>> ---
> >>>  fs/nfs/client.c                 |    2 +-
> >>>  fs/nfsd/nfs4callback.c          |    2 +-
> >>>  include/linux/sunrpc/auth.h     |    3 +-
> >>>  include/linux/sunrpc/auth_gss.h |    2 +-
> >>>  net/sunrpc/auth_generic.c       |    6 +++-
> >>>  net/sunrpc/auth_gss/auth_gss.c  |   40 ++++++++++++++++++++++----------------
> >>>  6 files changed, 32 insertions(+), 23 deletions(-)
> >>>
> >>> diff --git a/fs/nfs/client.c b/fs/nfs/client.c
> >>> index 873bf00..32ea371 100644
> >>> --- a/fs/nfs/client.c
> >>> +++ b/fs/nfs/client.c
> >>> @@ -185,7 +185,7 @@ static struct nfs_client *nfs_alloc_client(const struct nfs_client_initdata *cl_
> >>>  	clp->cl_minorversion = cl_init->minorversion;
> >>>  	clp->cl_mvops = nfs_v4_minor_ops[cl_init->minorversion];
> >>>  #endif
> >>> -	cred = rpc_lookup_machine_cred();
> >>> +	cred = rpc_lookup_machine_cred("*");
> >>>  	if (!IS_ERR(cred))
> >>>  		clp->cl_machine_cred = cred;
> >>>  	nfs_fscache_get_client_cookie(clp);
> >>> diff --git a/fs/nfsd/nfs4callback.c b/fs/nfsd/nfs4callback.c
> >>> index 7748d6a..6f3ebb4 100644
> >>> --- a/fs/nfsd/nfs4callback.c
> >>> +++ b/fs/nfsd/nfs4callback.c
> >>> @@ -718,7 +718,7 @@ int set_callback_cred(void)
> >>>  {
> >>>  	if (callback_cred)
> >>>  		return 0;
> >>> -	callback_cred = rpc_lookup_machine_cred();
> >>> +	callback_cred = rpc_lookup_machine_cred("nfs");
> >>>  	if (!callback_cred)
> >>>  		return -ENOMEM;
> >>>  	return 0;
> >>> diff --git a/include/linux/sunrpc/auth.h b/include/linux/sunrpc/auth.h
> >>> index febc4db..7874a8a 100644
> >>> --- a/include/linux/sunrpc/auth.h
> >>> +++ b/include/linux/sunrpc/auth.h
> >>> @@ -26,6 +26,7 @@ struct auth_cred {
> >>>  	uid_t	uid;
> >>>  	gid_t	gid;
> >>>  	struct group_info *group_info;
> >>> +	const char *principal;
> >>>  	unsigned char machine_cred : 1;
> >>>  };
> >>>  
> >>> @@ -127,7 +128,7 @@ void			rpc_destroy_generic_auth(void);
> >>>  void 			rpc_destroy_authunix(void);
> >>>  
> >>>  struct rpc_cred *	rpc_lookup_cred(void);
> >>> -struct rpc_cred *	rpc_lookup_machine_cred(void);
> >>> +struct rpc_cred *	rpc_lookup_machine_cred(const char *service_name);
> >>>  int			rpcauth_register(const struct rpc_authops *);
> >>>  int			rpcauth_unregister(const struct rpc_authops *);
> >>>  struct rpc_auth *	rpcauth_create(rpc_authflavor_t, struct rpc_clnt *);
> >>> diff --git a/include/linux/sunrpc/auth_gss.h b/include/linux/sunrpc/auth_gss.h
> >>> index 8eee9db..f1cfd4c 100644
> >>> --- a/include/linux/sunrpc/auth_gss.h
> >>> +++ b/include/linux/sunrpc/auth_gss.h
> >>> @@ -82,8 +82,8 @@ struct gss_cred {
> >>>  	enum rpc_gss_svc	gc_service;
> >>>  	struct gss_cl_ctx __rcu	*gc_ctx;
> >>>  	struct gss_upcall_msg	*gc_upcall;
> >>> +	const char		*gc_principal;
> >>>  	unsigned long		gc_upcall_timestamp;
> >>> -	unsigned char		gc_machine_cred : 1;
> >>>  };
> >>>  
> >>>  #endif /* __KERNEL__ */
> >>> diff --git a/net/sunrpc/auth_generic.c b/net/sunrpc/auth_generic.c
> >>> index e010a01..1426ec3 100644
> >>> --- a/net/sunrpc/auth_generic.c
> >>> +++ b/net/sunrpc/auth_generic.c
> >>> @@ -41,15 +41,17 @@ EXPORT_SYMBOL_GPL(rpc_lookup_cred);
> >>>  /*
> >>>   * Public call interface for looking up machine creds.
> >>>   */
> >>> -struct rpc_cred *rpc_lookup_machine_cred(void)
> >>> +struct rpc_cred *rpc_lookup_machine_cred(const char *service_name)
> >>>  {
> >>>  	struct auth_cred acred = {
> >>>  		.uid = RPC_MACHINE_CRED_USERID,
> >>>  		.gid = RPC_MACHINE_CRED_GROUPID,
> >>> +		.principal = service_name,
> >>>  		.machine_cred = 1,
> >>>  	};
> >>>  
> >>> -	dprintk("RPC:       looking up machine cred\n");
> >>> +	dprintk("RPC:       looking up machine cred for service %s\n",
> >>> +			service_name);
> >>>  	return generic_auth.au_ops->lookup_cred(&generic_auth, &acred, 0);
> >>>  }
> >>>  EXPORT_SYMBOL_GPL(rpc_lookup_machine_cred);
> >>> diff --git a/net/sunrpc/auth_gss/auth_gss.c b/net/sunrpc/auth_gss/auth_gss.c
> >>> index afb5655..28d72d2 100644
> >>> --- a/net/sunrpc/auth_gss/auth_gss.c
> >>> +++ b/net/sunrpc/auth_gss/auth_gss.c
> >>> @@ -392,7 +392,8 @@ static void gss_encode_v0_msg(struct gss_upcall_msg *gss_msg)
> >>>  }
> >>>  
> >>>  static void gss_encode_v1_msg(struct gss_upcall_msg *gss_msg,
> >>> -				struct rpc_clnt *clnt, int machine_cred)
> >>> +				struct rpc_clnt *clnt,
> >>> +				const char *service_name)
> >>>  {
> >>>  	struct gss_api_mech *mech = gss_msg->auth->mech;
> >>>  	char *p = gss_msg->databuf;
> >>> @@ -407,12 +408,8 @@ static void gss_encode_v1_msg(struct gss_upcall_msg *gss_msg,
> >>>  		p += len;
> >>>  		gss_msg->msg.len += len;
> >>>  	}
> >>> -	if (machine_cred) {
> >>> -		len = sprintf(p, "service=* ");
> >>> -		p += len;
> >>> -		gss_msg->msg.len += len;
> >>> -	} else if (!strcmp(clnt->cl_program->name, "nfs4_cb")) {
> >>> -		len = sprintf(p, "service=nfs ");
> >>> +	if (service_name != NULL) {
> >>> +		len = sprintf(p, "service=%s ", service_name);
> >>>  		p += len;
> >>>  		gss_msg->msg.len += len;
> >>>  	}
> >>> @@ -429,17 +426,18 @@ static void gss_encode_v1_msg(struct gss_upcall_msg *gss_msg,
> >>>  }
> >>>  
> >>>  static void gss_encode_msg(struct gss_upcall_msg *gss_msg,
> >>> -				struct rpc_clnt *clnt, int machine_cred)
> >>> +				struct rpc_clnt *clnt,
> >>> +				const char *service_name)
> >>>  {
> >>>  	if (pipe_version == 0)
> >>>  		gss_encode_v0_msg(gss_msg);
> >>>  	else /* pipe_version == 1 */
> >>> -		gss_encode_v1_msg(gss_msg, clnt, machine_cred);
> >>> +		gss_encode_v1_msg(gss_msg, clnt, service_name);
> >>>  }
> >>>  
> >>> -static inline struct gss_upcall_msg *
> >>> -gss_alloc_msg(struct gss_auth *gss_auth, uid_t uid, struct rpc_clnt *clnt,
> >>> -		int machine_cred)
> >>> +static struct gss_upcall_msg *
> >>> +gss_alloc_msg(struct gss_auth *gss_auth, struct rpc_clnt *clnt,
> >>> +		uid_t uid, const char *service_name)
> >>>  {
> >>>  	struct gss_upcall_msg *gss_msg;
> >>>  	int vers;
> >>> @@ -459,7 +457,7 @@ gss_alloc_msg(struct gss_auth *gss_auth, uid_t uid, struct rpc_clnt *clnt,
> >>>  	atomic_set(&gss_msg->count, 1);
> >>>  	gss_msg->uid = uid;
> >>>  	gss_msg->auth = gss_auth;
> >>> -	gss_encode_msg(gss_msg, clnt, machine_cred);
> >>> +	gss_encode_msg(gss_msg, clnt, service_name);
> >>>  	return gss_msg;
> >>>  }
> >>>  
> >>> @@ -471,7 +469,7 @@ gss_setup_upcall(struct rpc_clnt *clnt, struct gss_auth *gss_auth, struct rpc_cr
> >>>  	struct gss_upcall_msg *gss_new, *gss_msg;
> >>>  	uid_t uid = cred->cr_uid;
> >>>  
> >>> -	gss_new = gss_alloc_msg(gss_auth, uid, clnt, gss_cred->gc_machine_cred);
> >>> +	gss_new = gss_alloc_msg(gss_auth, clnt, uid, gss_cred->gc_principal);
> >>>  	if (IS_ERR(gss_new))
> >>>  		return gss_new;
> >>>  	gss_msg = gss_add_msg(gss_new);
> >>> @@ -995,7 +993,9 @@ gss_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags)
> >>>  	 */
> >>>  	cred->gc_base.cr_flags = 1UL << RPCAUTH_CRED_NEW;
> >>>  	cred->gc_service = gss_auth->service;
> >>> -	cred->gc_machine_cred = acred->machine_cred;
> >>> +	cred->gc_principal = NULL;
> >>> +	if (acred->machine_cred)
> >>> +		cred->gc_principal = acred->principal;
> >>>  	kref_get(&gss_auth->kref);
> >>>  	return &cred->gc_base;
> >>>  
> >>> @@ -1030,7 +1030,12 @@ gss_match(struct auth_cred *acred, struct rpc_cred *rc, int flags)
> >>>  	if (!test_bit(RPCAUTH_CRED_UPTODATE, &rc->cr_flags))
> >>>  		return 0;
> >>>  out:
> >>> -	if (acred->machine_cred != gss_cred->gc_machine_cred)
> >>> +	if (acred->principal != NULL) {
> >>> +		if (gss_cred->gc_principal == NULL)
> >>> +			return 0;
> >>> +		return strcmp(acred->principal, gss_cred->gc_principal) == 0;
> >>> +	}
> >>> +	if (gss_cred->gc_principal != NULL)
> >>>  		return 0;
> >>>  	return rc->cr_uid == acred->uid;
> >>>  }
> >>> @@ -1104,7 +1109,8 @@ static int gss_renew_cred(struct rpc_task *task)
> >>>  	struct rpc_auth *auth = oldcred->cr_auth;
> >>>  	struct auth_cred acred = {
> >>>  		.uid = oldcred->cr_uid,
> >>> -		.machine_cred = gss_cred->gc_machine_cred,
> >>> +		.principal = gss_cred->gc_principal,
> >>> +		.machine_cred = (gss_cred->gc_principal != NULL ? 1 : 0),
> >>>  	};
> >>>  	struct rpc_cred *new;
> >>>  
> >>> -- 
> >>> 1.7.7.5
> >>>
> >>> --
> >>> To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
> >>> the body of a message to majordomo@xxxxxxxxxxxxxxx
> >>> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> > --
> > To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
> > the body of a message to majordomo@xxxxxxxxxxxxxxx
> > More majordomo info at  http://vger.kernel.org/majordomo-info.html
> 
> 
--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Filesystem Development]     [Linux USB Development]     [Linux Media Development]     [Video for Linux]     [Linux NILFS]     [Linux Audio Users]     [Yosemite Info]     [Linux SCSI]

  Powered by Linux