Re: NFSv4 idmap misbehavior

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Chuck Lever <chuck.lever@xxxxxxxxxx> wrote:

> After the test has been running for ten minutes, the id_resolv
> keys expire, and id_legacy keys appear. Before the above commit,
> the id_resolv keys would simply be refreshed and operation
> would continue normally.
> 
> # grep id_ /proc/keys
> 00f0a664 I--Q-N-     1  42s 3b010000     0     0 id_legacy uid:cel@xxxxxxxxxx

The 'N' flag indicates that the key is negatively instantiated - ie. the
upcall to instantiate them failed in some way.  Keys so marked will cause key
lookups to return ENOKEY (or maybe some other error if keyctl_reject() was
used).

Failure can be due to the key being properly negatively instantiated
(keyctl_negate() or keyctl_reject()) or the userspace side of instantiation
exiting or otherwise dying before it managed to instantiate the key.

Is there anything to actually process the id_legacy upcall?  It appears
they're all negatively instantiated.

Can you stick "#define __KDEBUG" at the top of security/keys/request_key.c,
rebuild and look in dmesg?

Also, /sbin/request-key logs to syslog if it can't find a match in its config
file.

David
--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Filesystem Development]     [Linux USB Development]     [Linux Media Development]     [Video for Linux]     [Linux NILFS]     [Linux Audio Users]     [Yosemite Info]     [Linux SCSI]

  Powered by Linux