Re: leaking rcache opens in gss_accept_sec_context

2011-07-20 Thread Benjamin Coddington
On Jul 20, 2011, at 1:07 AM, Greg Hudson wrote: On Tue, 2011-07-19 at 16:21 -0400, Benjamin Coddington wrote: gss_acquire_cred gss_accept_sec_context gss_export_lucid_sec_context gss_delete_sec_context I found that before we got to gss_delete_sec_context(), we had already tried to clean up

Re: leaking rcache opens in gss_accept_sec_context

2011-07-19 Thread Benjamin Coddington
On Jul 14, 2011, at 9:40 AM, Greg Hudson wrote: On Wed, 2011-07-13 at 15:33 -0400, Benjamin Coddington wrote: Anyway, calling gss_accept_sec_context this way allows svcgssd to create a context for any requested service name -- but the problem we found is that svcgssd opens the kerberos replay

leaking rcache opens in gss_accept_sec_context

2011-07-13 Thread Benjamin Coddington
I am working on a linux NFS cluster that requires a single svcgssd to establish contexts under multiple service names. In this scenario, svcgssd can be started with -n so that it acquires creds at context creation. The behavior with -n is to call gss_accept_sec_context() with a NULL