Return-Path: Received: from elasmtp-junco.atl.sa.earthlink.net ([209.86.89.63]:51836 "EHLO elasmtp-junco.atl.sa.earthlink.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752468AbbIPVhF convert rfc822-to-8bit (ORCPT ); Wed, 16 Sep 2015 17:37:05 -0400 From: "Frank Filz" To: "'Trond Myklebust'" , "'Chuck Lever'" Cc: "'Linux NFS Mailing List'" References: <1442429367.24127.6.camel@localhost.localdomain> <08D9E2B0-B4A8-4DF0-9BB7-B19B2D260E97@oracle.com> In-Reply-To: Subject: RE: [PATCH] Use a separate superblock if mount requires a different security flavor Date: Wed, 16 Sep 2015 14:36:46 -0700 Message-ID: <001a01d0f0c7$ca84e6d0$5f8eb470$@mindspring.com> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Sender: linux-nfs-owner@vger.kernel.org List-ID: > On Wed, Sep 16, 2015 at 4:55 PM, Chuck Lever > wrote: > > > > On Sep 16, 2015, at 4:52 PM, Trond Myklebust > wrote: > > > >> On Wed, Sep 16, 2015 at 2:49 PM, Frank Filz > wrote: > >>> If a server has two exports from the same filesystem but with > >>> different security flavors allowed, when the client mounts first one > >>> and then the second, the same super block was being used. This > >>> resulted in the security flavor for the first export being applied > >>> to access to the second export. > >>> > >>> The fix is simply to check the security flavor of the nfs_server > >>> temporarily constructed for the second mount within > nfs_compare_super. > >>> > >>> Signed-off-by: Frank S. Filz > >>> --- > >>> fs/nfs/super.c | 3 +++ > >>> 1 file changed, 3 insertions(+) > >>> > >>> diff --git a/fs/nfs/super.c b/fs/nfs/super.c index 084af10..44d60f1 > >>> 100644 > >>> --- a/fs/nfs/super.c > >>> +++ b/fs/nfs/super.c > >>> @@ -2455,6 +2455,9 @@ static int nfs_compare_super(struct > >>> super_block *sb, void *data) > >>> struct nfs_server *server = sb_mntdata->server, *old = > >>> NFS_SB(sb); > >>> int mntflags = sb_mntdata->mntflags; > >>> > >>> + if(old->client->cl_auth->au_flavor > >>> + != server->client->cl_auth->au_flavor) > >>> + return 0; > >> > >> Isn't this check already being performed in > >> nfs_compare_mount_options()? As far as I can see, the difference is > >> that you are checking unconditionally, whereas > >> nfs_compare_mount_options only does so if there was a 'sec=' line > >> specified in the mount options. > > > > Right. If the user doesn't provide a sec=, the security flavor is > > autonegotiated. In the case Frank describes, there are two directories > > shared on the server, each from the same FSID but using distinct > > security policies. > > > > So the mount options comparison is inadequate if no sec= is specified > > on the mount command line. > > We don't claim to support autonegotiation of multiple security policies per > filesystem, in general. We only claim to support one auth flavour per super > block. > > If I understand you correctly, you are knowingly trying to work around that > limitation by performing multiple mounts of the same filesystem and force it > to use multiple super blocks. Why can't you then also specify the 'sec='? I see that point, but why not just make this case work smoothly rather than force the user to go back and specify -o sec on the mount? Actually all that is necessary is SOME difference in mount options (or use -o nosharedcache, which could be used on all the mounts so all can have the same mount options...) and allow security negotiation to work. An interesting question is if there are any servers out there that don't typically provide different FSID for different portions of the namespace, but also provide a mechanism to specify different security policies for different portions of the namespace? Frank --- This email has been checked for viruses by Avast antivirus software. https://www.avast.com/antivirus