linux-nfs.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: "J. Bruce Fields" <bfields@redhat.com>
To: "Myklebust, Trond" <Trond.Myklebust@netapp.com>
Cc: "linux-nfs@vger.kernel.org" <linux-nfs@vger.kernel.org>,
	"chuck.lever@oracle.com" <chuck.lever@oracle.com>,
	"simo@redhat.com" <simo@redhat.com>
Subject: Re: [PATCH 5/6] SUNRPC: Add RPC based upcall mechanism for RPCGSS auth
Date: Thu, 21 Feb 2013 14:58:10 -0500	[thread overview]
Message-ID: <20130221195810.GD3531@pad.fieldses.org> (raw)
In-Reply-To: <4FA345DA4F4AE44899BD2B03EEEC2FA9235DA682@SACEXCMBX04-PRD.hq.netapp.com>

On Thu, Feb 21, 2013 at 06:35:46PM +0000, Myklebust, Trond wrote:
> On Thu, 2013-02-21 at 11:38 -0500, J. Bruce Fields wrote:
> > From: Simo Sorce <simo@redhat.com>
> > 
> > This patch implements a sunrpc client to use the services of the gssproxy
> > userspace daemon.
> > 
> > In particular it allows to perform calls in user space using an RPC
> > call instead of custom hand-coded upcall/downcall messages.
> > 
> > Currently only accept_sec_context is implemented as that is all is needed for
> > the server case.
> > 
> > File server modules like NFS and CIFS can use full gssapi services this way,
> > once init_sec_context is also implemented.
> > 
> > For the NFS server case this code allow to lift the limit of max 2k krb5
> > tickets. This limit is prevents legitimate kerberos deployments from using krb5
> > authentication with the Linux NFS server as they have normally ticket that are
> > many kilobytes large.
> > 
> > It will also allow to lift the limitation on the size of the credential set
> > (uid,gid,gids) passed down from user space for users that have very many groups
> > associated. Currently the downcall mechanism used by rpc.svcgssd is limited
> > to around 2k secondary groups of the 65k allowed by kernel structures.
> > 
> > Signed-off-by: Simo Sorce <simo@redhat.com>
> > Signed-off-by: J. Bruce Fields <bfields@redhat.com>
> > ---
> >  net/sunrpc/auth_gss/Makefile         |    3 +-
> >  net/sunrpc/auth_gss/gss_rpc_upcall.c |  353 +++++++++++++
> >  net/sunrpc/auth_gss/gss_rpc_upcall.h |   43 ++
> >  net/sunrpc/auth_gss/gss_rpc_xdr.c    |  906 ++++++++++++++++++++++++++++++++++
> >  net/sunrpc/auth_gss/gss_rpc_xdr.h    |  269 ++++++++++
> >  5 files changed, 1573 insertions(+), 1 deletion(-)
> >  create mode 100644 net/sunrpc/auth_gss/gss_rpc_upcall.c
> >  create mode 100644 net/sunrpc/auth_gss/gss_rpc_upcall.h
> >  create mode 100644 net/sunrpc/auth_gss/gss_rpc_xdr.c
> >  create mode 100644 net/sunrpc/auth_gss/gss_rpc_xdr.h
> > 
> > diff --git a/net/sunrpc/auth_gss/Makefile b/net/sunrpc/auth_gss/Makefile
> > index 9e4cb59..14e9e53 100644
> > --- a/net/sunrpc/auth_gss/Makefile
> > +++ b/net/sunrpc/auth_gss/Makefile
> > @@ -5,7 +5,8 @@
> >  obj-$(CONFIG_SUNRPC_GSS) += auth_rpcgss.o
> >  
> >  auth_rpcgss-y := auth_gss.o gss_generic_token.o \
> > -	gss_mech_switch.o svcauth_gss.o
> > +	gss_mech_switch.o svcauth_gss.o \
> > +	gss_rpc_upcall.o gss_rpc_xdr.o
> >  
> >  obj-$(CONFIG_RPCSEC_GSS_KRB5) += rpcsec_gss_krb5.o
> >  
> > diff --git a/net/sunrpc/auth_gss/gss_rpc_upcall.c b/net/sunrpc/auth_gss/gss_rpc_upcall.c
> > new file mode 100644
> > index 0000000..5fd8c91
> > --- /dev/null
> > +++ b/net/sunrpc/auth_gss/gss_rpc_upcall.c
> > @@ -0,0 +1,353 @@
> > +/*
> > + *  linux/net/sunrpc/gss_rpc_upcall.c
> > + *
> > + *  Copyright (C) 2012 Simo Sorce <simo@redhat.com>
> > + *
> > + * This program is free software; you can redistribute it and/or modify
> > + * it under the terms of the GNU General Public License as published by
> > + * the Free Software Foundation; either version 2 of the License, or
> > + * (at your option) any later version.
> > + *
> > + * This program is distributed in the hope that it will be useful,
> > + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> > + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> > + * GNU General Public License for more details.
> > + *
> > + * You should have received a copy of the GNU General Public License
> > + * along with this program; if not, write to the Free Software
> > + * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
> > + */
> > +
> > +#include <linux/types.h>
> > +#include <linux/un.h>
> > +
> > +#include <linux/sunrpc/svcauth.h>
> > +#include "gss_rpc_upcall.h"
> > +
> > +#define GSSPROXY_SOCK_PATHNAME	"/var/run/gssproxy.sock"
> > +
> > +#define GSSPROXY_PROGRAM	(400112u)
> > +#define GSSPROXY_VERS_1		(1u)
> > +
> > +DEFINE_MUTEX(gssp_clnt_mutex);
> > +struct rpc_clnt *gssp_clnt;
> > +
> > +/*
> > + * Encoding/Decoding functions
> > + */
> > +
> > +enum {
> > +	GSSX_NULL = 0,	/* Unused */
> > +        GSSX_INDICATE_MECHS = 1,
> > +        GSSX_GET_CALL_CONTEXT = 2,
> > +        GSSX_IMPORT_AND_CANON_NAME = 3,
> > +        GSSX_EXPORT_CRED = 4,
> > +        GSSX_IMPORT_CRED = 5,
> > +        GSSX_ACQUIRE_CRED = 6,
> > +        GSSX_STORE_CRED = 7,
> > +        GSSX_INIT_SEC_CONTEXT = 8,
> > +        GSSX_ACCEPT_SEC_CONTEXT = 9,
> > +        GSSX_RELEASE_HANDLE = 10,
> > +        GSSX_GET_MIC = 11,
> > +        GSSX_VERIFY = 12,
> > +        GSSX_WRAP = 13,
> > +        GSSX_UNWRAP = 14,
> > +        GSSX_WRAP_SIZE_LIMIT = 15,
> > +};
> > +
> > +#define PROC(proc, name)				\
> > +[GSSX_##proc] = {					\
> > +	.p_proc   = GSSX_##proc,			\
> > +	.p_encode = (kxdreproc_t)gssx_enc_##name,	\
> > +	.p_decode = (kxdrdproc_t)gssx_dec_##name,	\
> > +	.p_arglen = GSSX_ARG_##name##_sz,		\
> > +	.p_replen = GSSX_RES_##name##_sz, 		\
> > +	.p_statidx = GSSX_##proc,			\
> > +	.p_name   = #proc,				\
> > +}
> > +
> > +struct rpc_procinfo gssp_procedures[] = {
> > +	PROC(INDICATE_MECHS, indicate_mechs),
> > +        PROC(GET_CALL_CONTEXT, get_call_context),
> > +        PROC(IMPORT_AND_CANON_NAME, import_and_canon_name),
> > +        PROC(EXPORT_CRED, export_cred),
> > +        PROC(IMPORT_CRED, import_cred),
> > +        PROC(ACQUIRE_CRED, acquire_cred),
> > +        PROC(STORE_CRED, store_cred),
> > +        PROC(INIT_SEC_CONTEXT, init_sec_context),
> > +        PROC(ACCEPT_SEC_CONTEXT, accept_sec_context),
> > +        PROC(RELEASE_HANDLE, release_handle),
> > +        PROC(GET_MIC, get_mic),
> > +        PROC(VERIFY, verify),
> > +        PROC(WRAP, wrap),
> > +        PROC(UNWRAP, unwrap),
> > +        PROC(WRAP_SIZE_LIMIT, wrap_size_limit),
> > +};
> > +
> > +
> > +
> > +/*
> > + * Common transport functions
> > + */
> > +
> > +static const struct rpc_program gssp_program;
> > +
> > +static int gssp_rpc_create(struct net *net, struct rpc_clnt **_clnt)
> > +{
> > +	static const struct sockaddr_un gssp_localaddr = {
> > +		.sun_family		= AF_LOCAL,
> > +		.sun_path		= GSSPROXY_SOCK_PATHNAME,
> > +	};
> > +	struct rpc_create_args args = {
> > +		.net		= net,
> > +		.protocol	= XPRT_TRANSPORT_LOCAL,
> > +		.address	= (struct sockaddr *)&gssp_localaddr,
> > +		.addrsize	= sizeof(gssp_localaddr),
> > +		.servername	= "localhost",
> > +		.program	= &gssp_program,
> > +		.version	= GSSPROXY_VERS_1,
> > +		.authflavor	= RPC_AUTH_NULL,
> > +		.flags		= RPC_CLNT_CREATE_NOPING,
> > +	};
> > +	struct rpc_clnt *clnt;
> > +	int result = 0;
> > +
> > +	clnt = rpc_create(&args);
> > +	if (IS_ERR(clnt)) {
> > +		dprintk("RPC:       failed to create AF_LOCAL gssproxy "
> > +				"client (errno %ld).\n", PTR_ERR(clnt));
> > +		result = -PTR_ERR(clnt);
> > +		*_clnt = NULL;
> > +		goto out;
> > +	}
> > +
> > +	dprintk("RPC:       created new gssp local client (gssp_local_clnt: "
> > +			"%p)\n", clnt);
> > +	*_clnt = clnt;
> > +
> > +out:
> > +	return result;
> > +}
> > +
> > +static struct rpc_clnt *get_clnt(struct net *net, bool global_clnt)
> > +{
> > +	struct rpc_clnt *clnt;
> > +	int err;
> > +
> > +	mutex_lock(&gssp_clnt_mutex);
> > +
> > +	if (global_clnt && gssp_clnt)
> > +		return gssp_clnt;
> 
> Ehem.... mutex_unlock()? Better yet, add an 'out:' label below, and
> replace all the 'return' statements with gotos...

Ugh, sorry, this was a patch-ordering problem, I fixed this then merged
the fix into a later patch instead of this one.

I'll fix that and work through your following comments, thanks!

--b.

  reply	other threads:[~2013-02-21 19:58 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-02-21 16:38 [PATCH 0/6] gss-proxy upcall for nfsd J. Bruce Fields
2013-02-21 16:38 ` [PATCH 1/6] SUNRPC: make AF_LOCAL connect synchronous J. Bruce Fields
2013-02-21 18:17   ` Myklebust, Trond
2013-02-21 19:48     ` J. Bruce Fields
2013-02-21 20:02       ` Myklebust, Trond
2013-02-21 20:36         ` J. Bruce Fields
2013-02-21 20:42           ` Myklebust, Trond
2013-02-26  4:06             ` [PATCH] " J. Bruce Fields
2013-02-21 16:38 ` [PATCH 2/6] SUNRPC: attempt AF_LOCAL connect on setup J. Bruce Fields
2013-02-21 16:38 ` [PATCH 3/6] SUNRPC: no idle timeout for AF_LOCAL sockets J. Bruce Fields
2013-02-21 16:38 ` [PATCH 4/6] SUNRPC: conditionally return endtime from import_sec_context J. Bruce Fields
2013-02-21 16:38 ` [PATCH 5/6] SUNRPC: Add RPC based upcall mechanism for RPCGSS auth J. Bruce Fields
2013-02-21 18:35   ` Myklebust, Trond
2013-02-21 19:58     ` J. Bruce Fields [this message]
2013-02-21 21:37     ` J. Bruce Fields
2013-04-12 18:11     ` J. Bruce Fields
2013-04-12 18:21       ` Myklebust, Trond
2013-04-12 18:33         ` J. Bruce Fields
2013-02-21 16:38 ` [PATCH 6/6] SUNRPC: Use gssproxy upcall for server RPCGSS authentication J. Bruce Fields
2013-02-21 21:01   ` J. Bruce Fields
2013-02-26 13:27     ` Simo Sorce

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20130221195810.GD3531@pad.fieldses.org \
    --to=bfields@redhat.com \
    --cc=Trond.Myklebust@netapp.com \
    --cc=chuck.lever@oracle.com \
    --cc=linux-nfs@vger.kernel.org \
    --cc=simo@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).