diff options
author | Sage Weil <sage@inktank.com> | 2013-03-25 13:26:30 -0400 |
---|---|---|
committer | Sage Weil <sage@inktank.com> | 2013-05-02 00:17:15 -0400 |
commit | e9966076cdd952e19f2dd4854cd719be0d7cbebc (patch) | |
tree | c65c356996fcb0b58c5a9353011ae1cdc54ac577 | |
parent | 27859f9773e4a0b2042435b13400ee2c891a61f4 (diff) |
libceph: wrap auth methods in a mutex
The auth code is called from a variety of contexts, include the mon_client
(protected by the monc's mutex) and the messenger callbacks (currently
protected by nothing). Avoid chaos by protecting all auth state with a
mutex. Nothing is blocking, so this should be simple and lightweight.
Signed-off-by: Sage Weil <sage@inktank.com>
Reviewed-by: Alex Elder <elder@inktank.com>
-rw-r--r-- | include/linux/ceph/auth.h | 2 | ||||
-rw-r--r-- | net/ceph/auth.c | 78 |
2 files changed, 58 insertions, 22 deletions
diff --git a/include/linux/ceph/auth.h b/include/linux/ceph/auth.h index c9c3b3abe4a3..5f3386844134 100644 --- a/include/linux/ceph/auth.h +++ b/include/linux/ceph/auth.h | |||
@@ -78,6 +78,8 @@ struct ceph_auth_client { | |||
78 | u64 global_id; /* our unique id in system */ | 78 | u64 global_id; /* our unique id in system */ |
79 | const struct ceph_crypto_key *key; /* our secret key */ | 79 | const struct ceph_crypto_key *key; /* our secret key */ |
80 | unsigned want_keys; /* which services we want */ | 80 | unsigned want_keys; /* which services we want */ |
81 | |||
82 | struct mutex mutex; | ||
81 | }; | 83 | }; |
82 | 84 | ||
83 | extern struct ceph_auth_client *ceph_auth_init(const char *name, | 85 | extern struct ceph_auth_client *ceph_auth_init(const char *name, |
diff --git a/net/ceph/auth.c b/net/ceph/auth.c index a22de543cedb..6b923bcaa2a4 100644 --- a/net/ceph/auth.c +++ b/net/ceph/auth.c | |||
@@ -47,6 +47,7 @@ struct ceph_auth_client *ceph_auth_init(const char *name, const struct ceph_cryp | |||
47 | if (!ac) | 47 | if (!ac) |
48 | goto out; | 48 | goto out; |
49 | 49 | ||
50 | mutex_init(&ac->mutex); | ||
50 | ac->negotiating = true; | 51 | ac->negotiating = true; |
51 | if (name) | 52 | if (name) |
52 | ac->name = name; | 53 | ac->name = name; |
@@ -73,10 +74,12 @@ void ceph_auth_destroy(struct ceph_auth_client *ac) | |||
73 | */ | 74 | */ |
74 | void ceph_auth_reset(struct ceph_auth_client *ac) | 75 | void ceph_auth_reset(struct ceph_auth_client *ac) |
75 | { | 76 | { |
77 | mutex_lock(&ac->mutex); | ||
76 | dout("auth_reset %p\n", ac); | 78 | dout("auth_reset %p\n", ac); |
77 | if (ac->ops && !ac->negotiating) | 79 | if (ac->ops && !ac->negotiating) |
78 | ac->ops->reset(ac); | 80 | ac->ops->reset(ac); |
79 | ac->negotiating = true; | 81 | ac->negotiating = true; |
82 | mutex_unlock(&ac->mutex); | ||
80 | } | 83 | } |
81 | 84 | ||
82 | int ceph_entity_name_encode(const char *name, void **p, void *end) | 85 | int ceph_entity_name_encode(const char *name, void **p, void *end) |
@@ -102,6 +105,7 @@ int ceph_auth_build_hello(struct ceph_auth_client *ac, void *buf, size_t len) | |||
102 | int i, num; | 105 | int i, num; |
103 | int ret; | 106 | int ret; |
104 | 107 | ||
108 | mutex_lock(&ac->mutex); | ||
105 | dout("auth_build_hello\n"); | 109 | dout("auth_build_hello\n"); |
106 | monhdr->have_version = 0; | 110 | monhdr->have_version = 0; |
107 | monhdr->session_mon = cpu_to_le16(-1); | 111 | monhdr->session_mon = cpu_to_le16(-1); |
@@ -122,15 +126,19 @@ int ceph_auth_build_hello(struct ceph_auth_client *ac, void *buf, size_t len) | |||
122 | 126 | ||
123 | ret = ceph_entity_name_encode(ac->name, &p, end); | 127 | ret = ceph_entity_name_encode(ac->name, &p, end); |
124 | if (ret < 0) | 128 | if (ret < 0) |
125 | return ret; | 129 | goto out; |
126 | ceph_decode_need(&p, end, sizeof(u64), bad); | 130 | ceph_decode_need(&p, end, sizeof(u64), bad); |
127 | ceph_encode_64(&p, ac->global_id); | 131 | ceph_encode_64(&p, ac->global_id); |
128 | 132 | ||
129 | ceph_encode_32(&lenp, p - lenp - sizeof(u32)); | 133 | ceph_encode_32(&lenp, p - lenp - sizeof(u32)); |
130 | return p - buf; | 134 | ret = p - buf; |
135 | out: | ||
136 | mutex_unlock(&ac->mutex); | ||
137 | return ret; | ||
131 | 138 | ||
132 | bad: | 139 | bad: |
133 | return -ERANGE; | 140 | ret = -ERANGE; |
141 | goto out; | ||
134 | } | 142 | } |
135 | 143 | ||
136 | static int ceph_build_auth_request(struct ceph_auth_client *ac, | 144 | static int ceph_build_auth_request(struct ceph_auth_client *ac, |
@@ -151,11 +159,13 @@ static int ceph_build_auth_request(struct ceph_auth_client *ac, | |||
151 | if (ret < 0) { | 159 | if (ret < 0) { |
152 | pr_err("error %d building auth method %s request\n", ret, | 160 | pr_err("error %d building auth method %s request\n", ret, |
153 | ac->ops->name); | 161 | ac->ops->name); |
154 | return ret; | 162 | goto out; |
155 | } | 163 | } |
156 | dout(" built request %d bytes\n", ret); | 164 | dout(" built request %d bytes\n", ret); |
157 | ceph_encode_32(&p, ret); | 165 | ceph_encode_32(&p, ret); |
158 | return p + ret - msg_buf; | 166 | ret = p + ret - msg_buf; |
167 | out: | ||
168 | return ret; | ||
159 | } | 169 | } |
160 | 170 | ||
161 | /* | 171 | /* |
@@ -176,6 +186,7 @@ int ceph_handle_auth_reply(struct ceph_auth_client *ac, | |||
176 | int result_msg_len; | 186 | int result_msg_len; |
177 | int ret = -EINVAL; | 187 | int ret = -EINVAL; |
178 | 188 | ||
189 | mutex_lock(&ac->mutex); | ||
179 | dout("handle_auth_reply %p %p\n", p, end); | 190 | dout("handle_auth_reply %p %p\n", p, end); |
180 | ceph_decode_need(&p, end, sizeof(u32) * 3 + sizeof(u64), bad); | 191 | ceph_decode_need(&p, end, sizeof(u32) * 3 + sizeof(u64), bad); |
181 | protocol = ceph_decode_32(&p); | 192 | protocol = ceph_decode_32(&p); |
@@ -227,35 +238,44 @@ int ceph_handle_auth_reply(struct ceph_auth_client *ac, | |||
227 | 238 | ||
228 | ret = ac->ops->handle_reply(ac, result, payload, payload_end); | 239 | ret = ac->ops->handle_reply(ac, result, payload, payload_end); |
229 | if (ret == -EAGAIN) { | 240 | if (ret == -EAGAIN) { |
230 | return ceph_build_auth_request(ac, reply_buf, reply_len); | 241 | ret = ceph_build_auth_request(ac, reply_buf, reply_len); |
231 | } else if (ret) { | 242 | } else if (ret) { |
232 | pr_err("auth method '%s' error %d\n", ac->ops->name, ret); | 243 | pr_err("auth method '%s' error %d\n", ac->ops->name, ret); |
233 | return ret; | ||
234 | } | 244 | } |
235 | return 0; | ||
236 | 245 | ||
237 | bad: | ||
238 | pr_err("failed to decode auth msg\n"); | ||
239 | out: | 246 | out: |
247 | mutex_unlock(&ac->mutex); | ||
240 | return ret; | 248 | return ret; |
249 | |||
250 | bad: | ||
251 | pr_err("failed to decode auth msg\n"); | ||
252 | ret = -EINVAL; | ||
253 | goto out; | ||
241 | } | 254 | } |
242 | 255 | ||
243 | int ceph_build_auth(struct ceph_auth_client *ac, | 256 | int ceph_build_auth(struct ceph_auth_client *ac, |
244 | void *msg_buf, size_t msg_len) | 257 | void *msg_buf, size_t msg_len) |
245 | { | 258 | { |
259 | int ret = 0; | ||
260 | |||
261 | mutex_lock(&ac->mutex); | ||
246 | if (!ac->protocol) | 262 | if (!ac->protocol) |
247 | return ceph_auth_build_hello(ac, msg_buf, msg_len); | 263 | ret = ceph_auth_build_hello(ac, msg_buf, msg_len); |
248 | BUG_ON(!ac->ops); | 264 | else if (ac->ops->should_authenticate(ac)) |
249 | if (ac->ops->should_authenticate(ac)) | 265 | ret = ceph_build_auth_request(ac, msg_buf, msg_len); |
250 | return ceph_build_auth_request(ac, msg_buf, msg_len); | 266 | mutex_unlock(&ac->mutex); |
251 | return 0; | 267 | return ret; |
252 | } | 268 | } |
253 | 269 | ||
254 | int ceph_auth_is_authenticated(struct ceph_auth_client *ac) | 270 | int ceph_auth_is_authenticated(struct ceph_auth_client *ac) |
255 | { | 271 | { |
256 | if (!ac->ops) | 272 | int ret = 0; |
257 | return 0; | 273 | |
258 | return ac->ops->is_authenticated(ac); | 274 | mutex_lock(&ac->mutex); |
275 | if (ac->ops) | ||
276 | ret = ac->ops->is_authenticated(ac); | ||
277 | mutex_unlock(&ac->mutex); | ||
278 | return ret; | ||
259 | } | 279 | } |
260 | EXPORT_SYMBOL(ceph_auth_is_authenticated); | 280 | EXPORT_SYMBOL(ceph_auth_is_authenticated); |
261 | 281 | ||
@@ -263,17 +283,23 @@ int ceph_auth_create_authorizer(struct ceph_auth_client *ac, | |||
263 | int peer_type, | 283 | int peer_type, |
264 | struct ceph_auth_handshake *auth) | 284 | struct ceph_auth_handshake *auth) |
265 | { | 285 | { |
286 | int ret = 0; | ||
287 | |||
288 | mutex_lock(&ac->mutex); | ||
266 | if (ac->ops && ac->ops->create_authorizer) | 289 | if (ac->ops && ac->ops->create_authorizer) |
267 | return ac->ops->create_authorizer(ac, peer_type, auth); | 290 | ret = ac->ops->create_authorizer(ac, peer_type, auth); |
268 | return 0; | 291 | mutex_unlock(&ac->mutex); |
292 | return ret; | ||
269 | } | 293 | } |
270 | EXPORT_SYMBOL(ceph_auth_create_authorizer); | 294 | EXPORT_SYMBOL(ceph_auth_create_authorizer); |
271 | 295 | ||
272 | void ceph_auth_destroy_authorizer(struct ceph_auth_client *ac, | 296 | void ceph_auth_destroy_authorizer(struct ceph_auth_client *ac, |
273 | struct ceph_authorizer *a) | 297 | struct ceph_authorizer *a) |
274 | { | 298 | { |
299 | mutex_lock(&ac->mutex); | ||
275 | if (ac->ops && ac->ops->destroy_authorizer) | 300 | if (ac->ops && ac->ops->destroy_authorizer) |
276 | ac->ops->destroy_authorizer(ac, a); | 301 | ac->ops->destroy_authorizer(ac, a); |
302 | mutex_unlock(&ac->mutex); | ||
277 | } | 303 | } |
278 | EXPORT_SYMBOL(ceph_auth_destroy_authorizer); | 304 | EXPORT_SYMBOL(ceph_auth_destroy_authorizer); |
279 | 305 | ||
@@ -283,8 +309,10 @@ int ceph_auth_update_authorizer(struct ceph_auth_client *ac, | |||
283 | { | 309 | { |
284 | int ret = 0; | 310 | int ret = 0; |
285 | 311 | ||
312 | mutex_lock(&ac->mutex); | ||
286 | if (ac->ops && ac->ops->update_authorizer) | 313 | if (ac->ops && ac->ops->update_authorizer) |
287 | ret = ac->ops->update_authorizer(ac, peer_type, a); | 314 | ret = ac->ops->update_authorizer(ac, peer_type, a); |
315 | mutex_unlock(&ac->mutex); | ||
288 | return ret; | 316 | return ret; |
289 | } | 317 | } |
290 | EXPORT_SYMBOL(ceph_auth_update_authorizer); | 318 | EXPORT_SYMBOL(ceph_auth_update_authorizer); |
@@ -292,15 +320,21 @@ EXPORT_SYMBOL(ceph_auth_update_authorizer); | |||
292 | int ceph_auth_verify_authorizer_reply(struct ceph_auth_client *ac, | 320 | int ceph_auth_verify_authorizer_reply(struct ceph_auth_client *ac, |
293 | struct ceph_authorizer *a, size_t len) | 321 | struct ceph_authorizer *a, size_t len) |
294 | { | 322 | { |
323 | int ret = 0; | ||
324 | |||
325 | mutex_lock(&ac->mutex); | ||
295 | if (ac->ops && ac->ops->verify_authorizer_reply) | 326 | if (ac->ops && ac->ops->verify_authorizer_reply) |
296 | return ac->ops->verify_authorizer_reply(ac, a, len); | 327 | ret = ac->ops->verify_authorizer_reply(ac, a, len); |
297 | return 0; | 328 | mutex_unlock(&ac->mutex); |
329 | return ret; | ||
298 | } | 330 | } |
299 | EXPORT_SYMBOL(ceph_auth_verify_authorizer_reply); | 331 | EXPORT_SYMBOL(ceph_auth_verify_authorizer_reply); |
300 | 332 | ||
301 | void ceph_auth_invalidate_authorizer(struct ceph_auth_client *ac, int peer_type) | 333 | void ceph_auth_invalidate_authorizer(struct ceph_auth_client *ac, int peer_type) |
302 | { | 334 | { |
335 | mutex_lock(&ac->mutex); | ||
303 | if (ac->ops && ac->ops->invalidate_authorizer) | 336 | if (ac->ops && ac->ops->invalidate_authorizer) |
304 | ac->ops->invalidate_authorizer(ac, peer_type); | 337 | ac->ops->invalidate_authorizer(ac, peer_type); |
338 | mutex_unlock(&ac->mutex); | ||
305 | } | 339 | } |
306 | EXPORT_SYMBOL(ceph_auth_invalidate_authorizer); | 340 | EXPORT_SYMBOL(ceph_auth_invalidate_authorizer); |