Re: [PATCH] nfsd4: don't pin clientids to pseudoflavors

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Oct 01, 2012 at 10:53:22AM -0700, Chuck Lever wrote:
> Cc: stable ?

OK, will do.--b.

> 
> Sent from my iPhone
> 
> On Oct 1, 2012, at 10:36 AM, "J. Bruce Fields" <bfields@xxxxxxxxxxxx> wrote:
> 
> > For 3.7.--b.
> > 
> > commit 4f01f198b0b3da95f17d96dd54431b02d98c65d3
> > Author: J. Bruce Fields <bfields@xxxxxxxxxx>
> > Date:   Tue Aug 21 12:48:30 2012 -0400
> > 
> >    nfsd4: don't pin clientids to pseudoflavors
> > 
> >    I added cr_flavor to the data compared in same_creds without any
> >    justification, in d5497fc693a446ce9100fcf4117c3f795ddfd0d2 "nfsd4: move
> >    rq_flavor into svc_cred".
> > 
> >    Recent client changes then started making
> > 
> >        mount -osec=krb5 server:/export /mnt/
> >        echo "hello" >/mnt/TMP
> >        umount /mnt/
> >        mount -osec=krb5i server:/export /mnt/
> >        echo "hello" >/mnt/TMP
> > 
> >    to fail due to a clid_inuse on the second open.
> > 
> >    Mounting sequentially like this with different flavors probably isn't
> >    that common outside artificial tests.  Also, the real bug here may be
> >    that the server isn't just destroying the former clientid in this case
> >    (because it isn't good enough at recognizing when the old state is
> >    gone).  But it prompted some discussion and a look back at the spec, and
> >    I think the check was probably wrong.  Fix and document.
> > 
> >    Signed-off-by: J. Bruce Fields <bfields@xxxxxxxxxx>
> > 
> > diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c
> > index 5122e17..0f8d7e7 100644
> > --- a/fs/nfsd/nfs4state.c
> > +++ b/fs/nfsd/nfs4state.c
> > @@ -1223,10 +1223,26 @@ static bool groups_equal(struct group_info *g1, struct group_info *g2)
> >    return true;
> > }
> > 
> > +/*
> > + * RFC 3530 language requires clid_inuse be returned when the
> > + * "principal" associated with a requests differs from that previously
> > + * used.  We use uid, gid's, and gss principal string as our best
> > + * approximation.  We also don't want to allow non-gss use of a client
> > + * established using gss: in theory cr_principal should catch that
> > + * change, but in practice cr_principal can be null even in the gss case
> > + * since gssd doesn't always pass down a principal string.
> > + */
> > +static bool is_gss_cred(struct svc_cred *cr)
> > +{
> > +    /* Is cr_flavor one of the gss "pseudoflavors"?: */
> > +    return (cr->cr_flavor > RPC_AUTH_MAXFLAVOR);
> > +}
> > +
> > +
> > static bool
> > same_creds(struct svc_cred *cr1, struct svc_cred *cr2)
> > {
> > -    if ((cr1->cr_flavor != cr2->cr_flavor)
> > +    if ((is_gss_cred(cr1) != is_gss_cred(cr2))
> >        || (cr1->cr_uid != cr2->cr_uid)
> >        || (cr1->cr_gid != cr2->cr_gid)
> >        || !groups_equal(cr1->cr_group_info, cr2->cr_group_info))
> > --
> > To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
> > the body of a message to majordomo@xxxxxxxxxxxxxxx
> > More majordomo info at  http://vger.kernel.org/majordomo-info.html
--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Filesystem Development]     [Linux USB Development]     [Linux Media Development]     [Video for Linux]     [Linux NILFS]     [Linux Audio Users]     [Yosemite Info]     [Linux SCSI]

  Powered by Linux