From owner-cvs-src-old@FreeBSD.ORG Wed Jul 1 16:42:23 2009 Return-Path: Delivered-To: cvs-src-old@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 6135A1065672 for ; Wed, 1 Jul 2009 16:42:23 +0000 (UTC) (envelope-from rmacklem@FreeBSD.org) Received: from repoman.freebsd.org (repoman.freebsd.org [IPv6:2001:4f8:fff6::29]) by mx1.freebsd.org (Postfix) with ESMTP id 4E47F8FC27 for ; Wed, 1 Jul 2009 16:42:23 +0000 (UTC) (envelope-from rmacklem@FreeBSD.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.14.3/8.14.3) with ESMTP id n61GgNKr026274 for ; Wed, 1 Jul 2009 16:42:23 GMT (envelope-from rmacklem@repoman.freebsd.org) Received: (from svn2cvs@localhost) by repoman.freebsd.org (8.14.3/8.14.3/Submit) id n61GgNHB026273 for cvs-src-old@freebsd.org; Wed, 1 Jul 2009 16:42:23 GMT (envelope-from rmacklem@repoman.freebsd.org) Message-Id: <200907011642.n61GgNHB026273@repoman.freebsd.org> X-Authentication-Warning: repoman.freebsd.org: svn2cvs set sender to rmacklem@repoman.freebsd.org using -f From: Rick Macklem Date: Wed, 1 Jul 2009 16:42:03 +0000 (UTC) To: cvs-src-old@freebsd.org X-FreeBSD-CVS-Branch: HEAD Subject: cvs commit: src/sys/rpc/rpcsec_gss rpcsec_gss.c X-BeenThere: cvs-src-old@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: **OBSOLETE** CVS commit messages for the src tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Jul 2009 16:42:23 -0000 rmacklem 2009-07-01 16:42:03 UTC FreeBSD src repository Modified files: sys/rpc/rpcsec_gss rpcsec_gss.c Log: SVN rev 195246 on 2009-07-01 16:42:03Z by rmacklem When unmounting an NFS mount using sec=krb5[ip], the umount system call could get hung sleeping on "gsssta" if the credentials for a user that had been accessing the mount point have expired. This happened because rpc_gss_destroy_context() would end up calling itself when the "destroy context" RPC was attempted, trying to refresh the credentials. This patch just checks for this case in rpc_gss_refresh() and returns without attempting the refresh, which avoids the recursive call to rpc_gss_destroy_context() and the subsequent hang. Reviewed by: dfr Approved by: re (Ken Smith), kib (mentor) Revision Changes Path 1.3 +14 -0 src/sys/rpc/rpcsec_gss/rpcsec_gss.c