Re: [RFC PATCH] NFSD: Support write delegations for pNFS LAYOUT operations

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2024-06-10 at 23:54 +0000, Trond Myklebust wrote:
> On Mon, 2024-06-10 at 13:43 -0400, Chuck Lever wrote:
> > On Mon, Jun 10, 2024 at 04:21:33PM +0000, Trond Myklebust wrote:
> > > On Mon, 2024-06-10 at 11:04 -0400, cel@xxxxxxxxxx wrote:
> > > > From: Chuck Lever <chuck.lever@xxxxxxxxxx>
> > > > 
> > > > I noticed LAYOUTGET(LAYOUTIOMODE4_RW) returning NFS4ERR_ACCESS
> > > > unexpectedly. The NFS client had created a file with mode 0444,
> > > > and
> > > > the server had returned a write delegation on the OPEN(CREATE).
> > > > The
> > > > client was requesting a RW layout using the write delegation
> > > > stateid
> > > > so that it could flush file modifications.
> > > > 
> > > > This client behavior was permitted for NFSv4.1 without pNFS, so
> > > > I
> > > > began looking at NFSD's implementation of LAYOUTGET.
> > > > 
> > > > The failure was because fh_verify() was doing a permission
> > > > check
> > > > as
> > > > part of verifying the FH. It uses the loga_iomode value to
> > > > specify
> > > > the @accmode argument. fh_verify(MAY_WRITE) on a file whose
> > > > mode
> > > > is
> > > > 0444 fails with -EACCES.
> > > > 
> > > > RFC 8881 Section 18.43.3 states:
> > > > > The use of the loga_iomode field depends upon the layout
> > > > > type,
> > > > > but
> > > > > should reflect the client's data access intent.
> > > > 
> > > > Further discussion of iomode values focuses on how the server
> > > > is
> > > > permitted to change returned the iomode when coalescing
> > > > layouts.
> > > > It says nothing about mandating the denial of LAYOUTGET
> > > > requests
> > > > due to file permission settings.
> > > > 
> > > > Appropriate permission checking is done when the client
> > > > acquires
> > > > the
> > > > stateid used in the LAYOUTGET operation, so remove the
> > > > permission
> > > > check from LAYOUTGET and LAYOUTCOMMIT, and rely on layout
> > > > stateid
> > > > checking instead.
> > > 
> > > Hmm... I'm not seeing any checking or enforcement of the
> > > EXCHGID4_FLAG_BIND_PRINC_STATEID flag in knfsd.
> > 
> > I appreciate your review!
> > 
> > I see that BIND_PRINC_STATEID is not set by NFSD. RFC 8881 Section
> > 18.16.4 says:
> > > Note that if the client ID was not created with the
> > > EXCHGID4_FLAG_BIND_PRINC_STATEID capability set in the reply to
> > > EXCHANGE_ID, then the server MUST NOT impose any requirement that
> > > READs and WRITEs sent for an open file have the same credentials
> > > as the OPEN itself, and the server is REQUIRED to perform access
> > > checking on the READs and WRITEs themselves.
> > 
> > 
> > Trond:
> > > Doesn't that mean that
> > > READ and WRITE are required to check access permissions, as per
> > > RFC8881, section 13.9.2.3?
> > 
> > Every NFSv4 READ and WRITE calls nfs4_preprocess_stateid_op(), and
> > nfs4_preprocess_stateid_op() calls nfsd_permission() (in
> > nfs4_check_file()). Seems like we're covered.
> > 
> > 
> > Trond:
> > > I'm not saying that the return of an ACCESS error is correct
> > > here,
> > > since the file was created using this credential, and so the
> > > caller
> > > should benefit from having owner privileges.
> > 
> > The alternative is to preserve the accmode logic but instead add
> > the
> > NFSD_MAY_OWNER_OVERRIDE flag, me thinks, which is not
> > objectionable.
> > 
> > 
> > Trond:
> > > However the issue is that knfsd should be either checking that
> > > the
> > > credential is correct w.r.t. the stateid (if
> > > EXCHGID4_FLAG_BIND_PRINC_STATEID is set and the stateid is not a
> > > special stateid) or that it is correct w.r.t. the file
> > > permissions
> > > (if
> > > EXCHGID4_FLAG_BIND_PRINC_STATEID is not set or the stateid is a
> > > special
> > > stateid).
> > 
> > But LAYOUTGET is not a READ or WRITE. I don't see language that
> > requires stateid / credential checking for it, but it's always
> > possible I might have missed something.
> > 
> > Also, RFC 5663 has nothing to say about BIND_PRINC_STATEID.
> > Further,
> > I'm not sure how a SCSI READ or WRITE can check credentials as NFS
> > stateids are not presented to SCSI/iSCSI targets.
> > 
> > Likewise, how would this impact a flexfile layout that targets
> > an NFSv3 DS?
> > 
> > I think NFSD is checking stateids used for NFSv4 READ and WRITE as
> > needed, but help me understand how BIND_PRINC_STATEID is applicable
> > to pNFS block layouts...?
> > 
> > 
> 
> If you look at Section 15.2, then NFS4ERR_ACCESS is definitely listed
> as a valid error for LAYOUTGET (in fact, the very first in the list).
> 
> Furthermore, please see the following blanket statement in RFC8881,
> section 12.5.1.:
> 
>    "Layouts are provided to NFSv4.1 clients, and user access still
>    follows the rules of the protocol as if they did not exist."
> 
> While you can argue that the above language is not normative, because
> it doesn't use the official IETF "MUST" / "MUST NOT" /..., it clearly
> does declare an intention to ensure that pNFS not be allowed to
> weaken
> the protocol.
> 
> So my point would be that if LAYOUTGET is the only time where a
> proper
> credential check can occur, then it needs to happen there. Otherwise,
> your implementation is responsible for ensuring that it happens at
> some
> other time, in order to ensure that user access follows the rules of
> the protocol.
> 

Put differently: unless you have an alternative mechanism for ensuring
that the NFSv4.1 rules are followed, then

 * If EXCHGID4_FLAG_BIND_PRINC_STATEID is not set, then LAYOUTGET needs
   to check the supplied credential against the file permissions, and a
   file permissions change while a layout is outstanding should almost
   certainly trigger a layout recall.
 * If EXCHGID4_FLAG_BIND_PRINC_STATEID is set, then LAYOUTGET needs to
   check the credential against the one that was used to create the
   stateid, however it should presumably not be necessary to perform
   the layout recall during a file permissions change.

-- 
Trond Myklebust Linux NFS client maintainer, Hammerspace
trond.myklebust@xxxxxxxxxxxxxxx




[Index of Archives]     [Linux Filesystem Development]     [Linux USB Development]     [Linux Media Development]     [Video for Linux]     [Linux NILFS]     [Linux Audio Users]     [Yosemite Info]     [Linux SCSI]

  Powered by Linux