Received: by 2002:a05:7412:2a8c:b0:e2:908c:2ebd with SMTP id u12csp2315252rdh; Tue, 26 Sep 2023 21:23:30 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGRbiL6gpTlzo50T1slHuewQcmOOYtPQxRuiFdkvk1iluvdIaSCR2g8a1WChpEX+/mj3Prg X-Received: by 2002:a05:6a20:1607:b0:15a:7d2:a418 with SMTP id l7-20020a056a20160700b0015a07d2a418mr1601589pzj.19.1695788609716; Tue, 26 Sep 2023 21:23:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695788609; cv=none; d=google.com; s=arc-20160816; b=nZGj0Sa7xmdNoIbMt9/WxcJ1Ud24PT/aoCRncA3QNvG9cfuRH46znEPB0tzP4y3adM xgtZWOmwR00zgQEMQiS94pg7Ng4dxm9zBJBYwB8hRxp2aiH/Z7HFsjx/YHN4a5Kc3wHx H7MHTzBTTDhqgxUU1DSRGwH84p2615ADw2hMfqAsxlczllUsRBOcGp7kkDhXGH2HFcR7 2gO1+H9GA0bCRI3R+A4THe5VNDGYL/D0/B/jPPCm04MpO1GKBqqmi23lxR3utjDvO/rB an7q/DAlaWdykggtVTDTecN65jqF6GE9dHkcNslAVtw5zj/Z59rYiKKfW3r1x/ODsXa1 jnIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from:mime-version :content-transfer-encoding:dkim-signature:dkim-signature; bh=6LJFYurvIBEdjZxWj6Q1GmsxiUMP/0yEOrmCGdQ4HiY=; fh=m+ZewVJjgUtdkaP1GmWDL3OCIUAGifBMNre3bDlbF9c=; b=e4LnRWl5kgT5Uo8/NnsgzTNQsWuPGeGrO7FXkM2ceMA6U0dz2DyHzMOV1ltmRKCJhH qIW/EpKCAz5Xq25IFmjUcVtWWE/02lFgt0soo0biwUlFviDggBxrQ8btNgeQDpTLjJi+ DUUtZm7zbz73vAHFxTciop8u5RGyrJT/HTOIPhTvX9mBuymd8AJ/XDIuW+3EUxf7OhhE azto0GmHsichUf1tFRcXALBRCFJ56Qo4mik2flInpspB5DunJBWnCtrijqssqBT7JCee 5pmJqJX7FYS3Eq0Nuz9aMwALzEJqWmQTrFJmtNDPwurJdcu0Lt2gyBCe4S22xIGLugnl 3RLQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=ZYdIWpZU; dkim=neutral (no key) header.i=@suse.de; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from groat.vger.email (groat.vger.email. [2620:137:e000::3:5]) by mx.google.com with ESMTPS id z19-20020a63e113000000b0057d7cff25besi11753521pgh.829.2023.09.26.21.23.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 26 Sep 2023 21:23:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) client-ip=2620:137:e000::3:5; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=ZYdIWpZU; dkim=neutral (no key) header.i=@suse.de; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 623B08303B2E; Tue, 26 Sep 2023 21:07:48 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229529AbjI0EHq (ORCPT + 99 others); Wed, 27 Sep 2023 00:07:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60464 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229595AbjI0EGm (ORCPT ); Wed, 27 Sep 2023 00:06:42 -0400 Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4D16C5B9D for ; Tue, 26 Sep 2023 19:10:17 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id B1F1921879; Wed, 27 Sep 2023 02:10:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1695780616; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=6LJFYurvIBEdjZxWj6Q1GmsxiUMP/0yEOrmCGdQ4HiY=; b=ZYdIWpZUlFO89tlvKNP8L9PRRwL3Aao0c8/IonWvmFDhow9DBh77wD47FexeNDflpTU2Gd Qm8YmztDzcQvt4VSAZkJOCm2FOE+m4Q9QUG46naSlEetjjhCekBWTX9Mbk69PUCkDoC1Qx gFSvbIBFtOuTtLzLLqDxckLFdtimsgs= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1695780616; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=6LJFYurvIBEdjZxWj6Q1GmsxiUMP/0yEOrmCGdQ4HiY=; b=oWBCybsnze2ByHpSW6WDBtK+7+wMH4goHOYsjKSpukE3vatWul86qm3MzJRkrsz9Pw87m0 LsSN//qeU3a0LaCg== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 741D61390B; Wed, 27 Sep 2023 02:10:15 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id Fz0KCgePE2VULQAAMHmgww (envelope-from ); Wed, 27 Sep 2023 02:10:15 +0000 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 From: "NeilBrown" To: Trond Myklebust , Steve Dickson Cc: linux-nfs@vger.kernel.org Subject: help with understanding match_fsid() errors in nfs-utils Date: Wed, 27 Sep 2023 12:10:11 +1000 Message-id: <169578061136.5939.6687963921006986794@noble.neil.brown.name> X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Tue, 26 Sep 2023 21:07:48 -0700 (PDT) hi Trond, I'm trying to understand Commit 76c21e3f70a8 ("mountd: Check the stat() return values in match_fsid()= ") in nfs-utils. The effect of this patch is that if a 'stat' of any path in /etc/exports or any mountpoint below any path marked crossmnt fails with an error other than one of a small set, then the fsid to path lookup aborts without reporting anything to the kernel, so the kernel doesn't reply to the client and the mount attempt blocks indefinitely. I have seen this happen when "/" is exported crossmnt, and when a stat of /run/user/1000/doc returns EACCES. This is a "fuse" mount for user 1000, and presumably it rejects any access from any other user. Could you please help me understand what this patch was trying to achieve? What sorts of errors were you expecting this to catch? Would it make sense to silently ignore the stat failure for paths that were found when scanning the mount table, and only take the more drastic action for paths explicitly listed in /etc/exports ?? Thanks, NeilBrown