Re: [PATCH] NFSv4: Don't perform cached access checks before we've OPENed the file

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





On 27.12.2015 04:06, Trond Myklebust wrote:
Donald Buczek reports that a nfs4 client incorrectly denies
execute access based on outdated file mode (missing 'x' bit).
After the mode on the server is 'fixed' (chmod +x) further execution
attempts continue to fail, because the nfs ACCESS call updates
the access parameter but not the mode parameter or the mode in
the inode.

The root cause is ultimately that the VFS is calling may_open()
before the NFS client has a chance to OPEN the file and hence revalidate
the access and attribute caches.

Al Viro suggests:
Make nfs_permission() relax the checks when it sees MAY_OPEN, if you know
that things will be caught by server anyway?
That can work as long as we're guaranteed that everything that calls
inode_permission() with MAY_OPEN on a regular file will also follow up
with a vfs_open() or dentry_open() on success. Is this always the
case?
1) in do_tmpfile(), followed by do_dentry_open() (not reachable by NFS since
it doesn't have ->tmpfile() instance anyway)

2) in atomic_open(), after the call of ->atomic_open() has succeeded.

3) in do_last(), followed on success by vfs_open()

That's all.  All calls of inode_permission() that get MAY_OPEN come from
may_open(), and there's no other callers of that puppy.
Reported-by: Donald Buczek <buczek@xxxxxxxxxxxxx>
Link: https://bugzilla.kernel.org/show_bug.cgi?id=109771
Link: http://lkml.kernel.org/r/1451046656-26319-1-git-send-email-buczek@xxxxxxxxxxxxx
Cc: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Signed-off-by: Trond Myklebust <trond.myklebust@xxxxxxxxxxxxxxx>
---
Hi Donald,
Can you check if this fixes the issue for you?

  fs/nfs/dir.c | 3 +++
  1 file changed, 3 insertions(+)

diff --git a/fs/nfs/dir.c b/fs/nfs/dir.c
index ce5a21861074..44e519c21e18 100644
--- a/fs/nfs/dir.c
+++ b/fs/nfs/dir.c
@@ -2449,6 +2449,9 @@ int nfs_permission(struct inode *inode, int mask)
  		case S_IFLNK:
  			goto out;
  		case S_IFREG:
+			if ((mask & MAY_OPEN) &&
+			   nfs_server_capable(inode, NFS_CAP_ATOMIC_OPEN))
+				return 0;
  			break;
  		case S_IFDIR:
  			/*


I can confirm that this fixes the original issue. However, even with this patch, calls to the access syscall would continue to deliver failure based on obsolete modes forever. This can be seen as a bug, too.

PS:

I don't yet understand the point of execute_ok. It doesn't even consider the uid.

Apart from that two suggestions to consider:

* If we go over the server for ACCESS anyway, we could combine it with a GETATTR compound operation. Then we would be ready for additional client-side checks against the inode. * If we look at the mode, we should validate it first ( nfs_revalidate_inode ? )

Regards
  Donald

--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux Filesystem Development]     [Linux USB Development]     [Linux Media Development]     [Video for Linux]     [Linux NILFS]     [Linux Audio Users]     [Yosemite Info]     [Linux SCSI]

  Powered by Linux