Re: [PATCH -V3] Generic name to handle and open by handle syscalls

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 22 Apr 2010 17:49:58 -0500, "Serge E. Hallyn" <serue@xxxxxxxxxx> wrote:
> Quoting Aneesh Kumar K.V (aneesh.kumar@xxxxxxxxxxxxxxxxxx):
> > Hi,
> > 
> > The below set of patches implement open by handle support using exportfs
> > operations. This allows user space application to map a file name to file 
> > handle and later open the file using handle. This should be usable
> > for userspace NFS [1] and 9P server [2]. XFS already support this with the ioctls
> > XFS_IOC_PATH_TO_HANDLE and XFS_IOC_OPEN_BY_HANDLE.
> > 
> > [1] http://nfs-ganesha.sourceforge.net/
> > [2] http://lists.gnu.org/archive/html/qemu-devel/2010-03/msg01087.html
> > 
> > TODO:
> > I guess we would need to optimize how we get the vfsmount for the filesystem
> > uuid specified. Searching the file system list and task name space may be a big
> > overhead for each open by handle call.
> > 
> > Chages from V2:
> > a) Support system wide unique handle.
> > 
> > Changes from v1:
> > a) handle size is now specified in bytes
> > b) returns -EOVERFLOW if the handle size is small
> > c) dropped open_handle syscall and added open_by_handle_at syscall
> >    open_by_handle_at takes mount_fd as the directory fd of the mount point
> >    containing the file
> > e) handle will only be unique in a given file system. So for an NFS server
> >    exporting multiple file system, NFS server will have to internally track the
> >    mount point to which a file handle belongs to. We should be able to do it much
> >    easily than expecting kernel to give a system wide unique file handle. System
> >    wide unique file handle would need much larger changes to the exportfs or VFS
> >    interface and I was not sure whether we really need to do that in the kernel or
> >    in the user space
> > f) open_handle_at now only check for DAC_OVERRIDE capability
> 
> Hi Aneesh,
> 
> it still scares me a bit as I expect to see some privileged userspace
> daemon accept (forged) handles from unprivileged users and pass back
> open fds, but adding some random token to prevent that would require
> storing it, so I think you're doing what you reasonably can by
> requiring DAC_OVERRIDE.

We still do access permission check using the file permission
modes. What we don't do is to check the execute (x) bit on the
directory. But the idea of adding DAC_OVERRIDE is to make sure
that we allow only privileged user to use the open by handle interface.


> 
> nsproxy bit looks fine, and i saw no problems in the rest of the set.
> As Andreas was saying I don't see why you're calling it _at, but
> meanwhile
> 
> Acked-by: Serge Hallyn <serue@xxxxxxxxxx>


I missed adding Acked-by:  in V4 iteration. But will add in V5
iteration. Can i add the same to all the patches ? Or do you want me to
add only to the nsproxy bits.

> 
> to the set.
> 
> -serge

-aneesh
--
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [Samba]     [Device Mapper]     [CEPH Development]
  Powered by Linux