a41d1bc642
caused by use of an invalid kgss_gssd_handle during an upcall to the gssd daemon when it has exited. This patch seems to avoid the crashes by holding a reference count on the kgss_gssd_handle until the upcall is done. It also adds a new mutex kgss_gssd_lock used to make manipulation of kgss_gssd_handle SMP safe. Tested by: Illias A. Marinos, Herbert Poeckl Reviewed by: jhb MFC after: 2 weeks |
||
---|---|---|
.. | ||
krb5 | ||
gss_accept_sec_context.c | ||
gss_acquire_cred.c | ||
gss_add_oid_set_member.c | ||
gss_canonicalize_name.c | ||
gss_create_empty_oid_set.c | ||
gss_delete_sec_context.c | ||
gss_display_status.c | ||
gss_export_name.c | ||
gss_get_mic.c | ||
gss_impl.c | ||
gss_import_name.c | ||
gss_init_sec_context.c | ||
gss_names.c | ||
gss_pname_to_uid.c | ||
gss_release_buffer.c | ||
gss_release_cred.c | ||
gss_release_name.c | ||
gss_release_oid_set.c | ||
gss_set_cred_option.c | ||
gss_test_oid_set_member.c | ||
gss_unwrap.c | ||
gss_verify_mic.c | ||
gss_wrap_size_limit.c | ||
gss_wrap.c | ||
gssapi_impl.h | ||
gssapi.h | ||
gssd_prot.c | ||
gssd.x | ||
gsstest.c | ||
kgss_if.m |