diff mbox

NFSv4.2: Fix file creating with O_EXCL get a bad mode

Message ID a76cec59-f007-5c26-dc26-4cc8a6e4daef@gmail.com (mailing list archive)
State New, archived
Headers show

Commit Message

Kinglong Mee Jan. 7, 2017, 2:45 p.m. UTC
Acorrding to Matthieu Herrb's test cases, a new created file will
get a bad mode as 0666 (expected 0644) after commit dff25ddb4808
"nfs: add support for the umask attribute".

It is caused by missing check of FATTR4_WORD2_MODE_UMASK
in nfs4_exclusive_attrset.

#include <sys/types.h>
#include <sys/stat.h>
#include <err.h>
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>

/*
 * Demonstrate file creation bug on NFS v4 and linux kernel 4.4+
 *
 * mktemp() is used on purpose.
 */
int
main(int argc, char *argv[])
{
	const char *name = argv[1];
	char tmp[] = "./tmpXXXXXXXXXX";
	struct stat buf;
	mode_t expected;
	int fd, i, n = 40;

	umask(S_IWGRP | S_IWOTH);
	expected = 0666 & ~(S_IWGRP | S_IWOTH);
	if (argv[1] == NULL)
		name = mktemp(tmp);
	for (i = 0; i < n; i++) {
		fd = open(name, O_RDWR|O_CREAT|O_EXCL, 0666);
		if (fd < 0)
			err(1, "open %s", name);
		memset(&buf, 0, sizeof(buf));
		if (stat(name, &buf) < 0)
			err(1, "stat %s", name);
		if ((buf.st_mode & (S_IRWXU|S_IRWXG|S_IRWXO)) != expected)
			printf("%s: %o\n", name,
			    (int)buf.st_mode & (S_IRWXU|S_IRWXG|S_IRWXO));
		else
			printf("%s: ok\n", name);
		unlink(name);
	}
	exit(0);
}

Signed-off-by: Kinglong Mee <kinglongmee@gmail.com>
---
 fs/nfs/nfs4proc.c | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

Comments

J. Bruce Fields Jan. 12, 2017, 8:47 p.m. UTC | #1
On Sat, Jan 07, 2017 at 10:45:47PM +0800, Kinglong Mee wrote:
> Acorrding to Matthieu Herrb's test cases, a new created file will
> get a bad mode as 0666 (expected 0644) after commit dff25ddb4808
> "nfs: add support for the umask attribute".
> 
> It is caused by missing check of FATTR4_WORD2_MODE_UMASK
> in nfs4_exclusive_attrset.

I don't understand:

> diff --git a/fs/nfs/nfs4proc.c b/fs/nfs/nfs4proc.c
> index 6dcbc5d..a3e9ef1 100644
> --- a/fs/nfs/nfs4proc.c
> +++ b/fs/nfs/nfs4proc.c
> @@ -2697,7 +2697,8 @@ static inline void nfs4_exclusive_attrset(struct nfs4_opendata *opendata,
>  		sattr->ia_valid |= ATTR_MTIME;
>  
>  	/* Except MODE, it seems harmless of setting twice. */
> -	if ((attrset[1] & FATTR4_WORD1_MODE))
> +	if ((attrset[1] & FATTR4_WORD1_MODE) ||
> +	    (attrset[2] & FATTR4_WORD2_MODE_UMASK))
>  		sattr->ia_valid &= ~ATTR_MODE;

If I'm understanding this function correctly, attrset is the set of
attributes which the server tells us were used to store the verifier.

But mode_umask would never be a sensible place to store the
verifier, so if the server's response really says that then something's
wrong.

We should probably look at a network trace.

--b.

>  
>  	if (attrset[2] & FATTR4_WORD2_SECURITY_LABEL)
> -- 
> 2.9.3
> 
> --
> To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Kinglong Mee Jan. 15, 2017, 7:55 a.m. UTC | #2
On 1/13/2017 04:47, J. Bruce Fields wrote:
> On Sat, Jan 07, 2017 at 10:45:47PM +0800, Kinglong Mee wrote:
>> Acorrding to Matthieu Herrb's test cases, a new created file will
>> get a bad mode as 0666 (expected 0644) after commit dff25ddb4808
>> "nfs: add support for the umask attribute".
>>
>> It is caused by missing check of FATTR4_WORD2_MODE_UMASK
>> in nfs4_exclusive_attrset.
> 
> I don't understand:
> 
>> diff --git a/fs/nfs/nfs4proc.c b/fs/nfs/nfs4proc.c
>> index 6dcbc5d..a3e9ef1 100644
>> --- a/fs/nfs/nfs4proc.c
>> +++ b/fs/nfs/nfs4proc.c
>> @@ -2697,7 +2697,8 @@ static inline void nfs4_exclusive_attrset(struct nfs4_opendata *opendata,
>>  		sattr->ia_valid |= ATTR_MTIME;
>>  
>>  	/* Except MODE, it seems harmless of setting twice. */
>> -	if ((attrset[1] & FATTR4_WORD1_MODE))
>> +	if ((attrset[1] & FATTR4_WORD1_MODE) ||
>> +	    (attrset[2] & FATTR4_WORD2_MODE_UMASK))
>>  		sattr->ia_valid &= ~ATTR_MODE;
> 
> If I'm understanding this function correctly, attrset is the set of
> attributes which the server tells us were used to store the verifier.
> 
> But mode_umask would never be a sensible place to store the
> verifier, so if the server's response really says that then something's
> wrong.

There are some differences between EXCLUSIVE4 and EXCLUSIVE4_1,
according to rfc5661 18.16.4, 

   After the client has performed a successful exclusive create, the
   attrset response indicates which attributes were used to store the
   verifier.  If EXCLUSIVE4 was used, the attributes set in attrset were
   used for the verifier.  If EXCLUSIVE4_1 was used, the client
   determines the attributes used for the verifier by comparing attrset
   with cva_attrs.attrmask; any bits set in the former but not the
   latter identify the attributes used to store the verifier.  The
   client MUST immediately send a SETATTR to set attributes used to
   store the verifier.  Until it does so, the attributes used to store
   the verifier cannot be relied upon.  The subsequent SETATTR MUST NOT
   occur in the same COMPOUND request as the OPEN.

I think, this patch is a hacker implement for EXCLUSIVE4_1 that just
treat the FATTR4_WORD1_TIME_ACCESS and FATTR4_WORD1_TIME_MODIFY for
exclusive verifier as EXCLUSIVE4. 

Maybe we need update the implement of EXCLUSIVE4_1's verifier checking.

thanks,
Kinglong Mee

> 
> We should probably look at a network trace.
> 
> --b.
> 
>>  
>>  	if (attrset[2] & FATTR4_WORD2_SECURITY_LABEL)
>> -- 
>> 2.9.3
>>
>> --
>> To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
>> the body of a message to majordomo@vger.kernel.org
>> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> 
--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Matthieu Herrb Jan. 16, 2017, 5:03 p.m. UTC | #3
On Sun, Jan 15, 2017 at 03:55:16PM +0800, Kinglong Mee wrote:
> On 1/13/2017 04:47, J. Bruce Fields wrote:
> > On Sat, Jan 07, 2017 at 10:45:47PM +0800, Kinglong Mee wrote:
> >> Acorrding to Matthieu Herrb's test cases, a new created file will
> >> get a bad mode as 0666 (expected 0644) after commit dff25ddb4808
> >> "nfs: add support for the umask attribute".
> >>
> >> It is caused by missing check of FATTR4_WORD2_MODE_UMASK
> >> in nfs4_exclusive_attrset.
> > 
> > I don't understand:
> > 
> >> diff --git a/fs/nfs/nfs4proc.c b/fs/nfs/nfs4proc.c
> >> index 6dcbc5d..a3e9ef1 100644
> >> --- a/fs/nfs/nfs4proc.c
> >> +++ b/fs/nfs/nfs4proc.c
> >> @@ -2697,7 +2697,8 @@ static inline void nfs4_exclusive_attrset(struct nfs4_opendata *opendata,
> >>  		sattr->ia_valid |= ATTR_MTIME;
> >>  
> >>  	/* Except MODE, it seems harmless of setting twice. */
> >> -	if ((attrset[1] & FATTR4_WORD1_MODE))
> >> +	if ((attrset[1] & FATTR4_WORD1_MODE) ||
> >> +	    (attrset[2] & FATTR4_WORD2_MODE_UMASK))
> >>  		sattr->ia_valid &= ~ATTR_MODE;
> > 
> > If I'm understanding this function correctly, attrset is the set of
> > attributes which the server tells us were used to store the verifier.
> > 
> > But mode_umask would never be a sensible place to store the
> > verifier, so if the server's response really says that then something's
> > wrong.
> 
> There are some differences between EXCLUSIVE4 and EXCLUSIVE4_1,
> according to rfc5661 18.16.4, 
> 
>    After the client has performed a successful exclusive create, the
>    attrset response indicates which attributes were used to store the
>    verifier.  If EXCLUSIVE4 was used, the attributes set in attrset were
>    used for the verifier.  If EXCLUSIVE4_1 was used, the client
>    determines the attributes used for the verifier by comparing attrset
>    with cva_attrs.attrmask; any bits set in the former but not the
>    latter identify the attributes used to store the verifier.  The
>    client MUST immediately send a SETATTR to set attributes used to
>    store the verifier.  Until it does so, the attributes used to store
>    the verifier cannot be relied upon.  The subsequent SETATTR MUST NOT
>    occur in the same COMPOUND request as the OPEN.
> 
> I think, this patch is a hacker implement for EXCLUSIVE4_1 that just
> treat the FATTR4_WORD1_TIME_ACCESS and FATTR4_WORD1_TIME_MODIFY for
> exclusive verifier as EXCLUSIVE4. 
> 
> Maybe we need update the implement of EXCLUSIVE4_1's verifier
> checking.

Hi,

this patch doesn't fix the issue against our NetApp server (which is
running an old version of the system as it has been noticed, but we
cannot upgrade until a few months) . My test program is still getting
a number of wrong issuess :

host$ ./a.out foo
foo: ok
foo: ok
foo: ok
foo: ok
foo: 700
foo: ok
foo: ok
foo: ok
foo: ok
foo: ok
foo: ok
foo: ok
foo: ok
foo: ok
foo: 700
foo: ok
foo: 700
foo: ok
foo: ok
foo: ok
foo: 700
foo: 700
foo: 700
foo: ok
foo: 700
foo: 700
foo: 700
foo: ok
foo: 700
foo: ok
foo: ok
foo: ok
foo: 700
foo: ok
foo: ok
foo: ok
foo: ok
foo: ok
foo: ok
foo: ok

> 
> thanks,
> Kinglong Mee
> 
> > 
> > We should probably look at a network trace.
> > 
> > --b.
> > 
> >>  
> >>  	if (attrset[2] & FATTR4_WORD2_SECURITY_LABEL)
> >> -- 
> >> 2.9.3
> >>
> >> --
> >> To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
> >> the body of a message to majordomo@vger.kernel.org
> >> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> > 
>
Kinglong Mee Jan. 18, 2017, 5:56 a.m. UTC | #4
On 1/17/2017 01:03, Matthieu Herrb wrote:
> On Sun, Jan 15, 2017 at 03:55:16PM +0800, Kinglong Mee wrote:
>> On 1/13/2017 04:47, J. Bruce Fields wrote:
>>> On Sat, Jan 07, 2017 at 10:45:47PM +0800, Kinglong Mee wrote:
>>>> Acorrding to Matthieu Herrb's test cases, a new created file will
>>>> get a bad mode as 0666 (expected 0644) after commit dff25ddb4808
>>>> "nfs: add support for the umask attribute".
>>>>
>>>> It is caused by missing check of FATTR4_WORD2_MODE_UMASK
>>>> in nfs4_exclusive_attrset.
>>>
>>> I don't understand:
>>>
>>>> diff --git a/fs/nfs/nfs4proc.c b/fs/nfs/nfs4proc.c
>>>> index 6dcbc5d..a3e9ef1 100644
>>>> --- a/fs/nfs/nfs4proc.c
>>>> +++ b/fs/nfs/nfs4proc.c
>>>> @@ -2697,7 +2697,8 @@ static inline void nfs4_exclusive_attrset(struct nfs4_opendata *opendata,
>>>>  		sattr->ia_valid |= ATTR_MTIME;
>>>>  
>>>>  	/* Except MODE, it seems harmless of setting twice. */
>>>> -	if ((attrset[1] & FATTR4_WORD1_MODE))
>>>> +	if ((attrset[1] & FATTR4_WORD1_MODE) ||
>>>> +	    (attrset[2] & FATTR4_WORD2_MODE_UMASK))
>>>>  		sattr->ia_valid &= ~ATTR_MODE;
>>>
>>> If I'm understanding this function correctly, attrset is the set of
>>> attributes which the server tells us were used to store the verifier.
>>>
>>> But mode_umask would never be a sensible place to store the
>>> verifier, so if the server's response really says that then something's
>>> wrong.
>>
>> There are some differences between EXCLUSIVE4 and EXCLUSIVE4_1,
>> according to rfc5661 18.16.4, 
>>
>>    After the client has performed a successful exclusive create, the
>>    attrset response indicates which attributes were used to store the
>>    verifier.  If EXCLUSIVE4 was used, the attributes set in attrset were
>>    used for the verifier.  If EXCLUSIVE4_1 was used, the client
>>    determines the attributes used for the verifier by comparing attrset
>>    with cva_attrs.attrmask; any bits set in the former but not the
>>    latter identify the attributes used to store the verifier.  The
>>    client MUST immediately send a SETATTR to set attributes used to
>>    store the verifier.  Until it does so, the attributes used to store
>>    the verifier cannot be relied upon.  The subsequent SETATTR MUST NOT
>>    occur in the same COMPOUND request as the OPEN.
>>
>> I think, this patch is a hacker implement for EXCLUSIVE4_1 that just
>> treat the FATTR4_WORD1_TIME_ACCESS and FATTR4_WORD1_TIME_MODIFY for
>> exclusive verifier as EXCLUSIVE4. 
>>
>> Maybe we need update the implement of EXCLUSIVE4_1's verifier
>> checking.
> 
> Hi,
> 
> this patch doesn't fix the issue against our NetApp server (which is
> running an old version of the system as it has been noticed, but we
> cannot upgrade until a few months) . My test program is still getting
> a number of wrong issuess :

That patch is for another bug of nfsv4.2, not for your problem,
so that, you can see the issue again.

Olga Kornievskaia said,
"That is a rather old NetApp release. Perhaps they've fix something.
I've just tried their latest 9.0 release and 4.9 upstream kernel and
file is created with 0644."

Can you test it in 9.0 release? Also exist?

thanks,
Kinglong Mee

> 
> host$ ./a.out foo
> foo: ok
> foo: ok
> foo: ok
> foo: ok
> foo: 700
> foo: ok
> foo: ok
> foo: ok
> foo: ok
> foo: ok
> foo: ok
> foo: ok
> foo: ok
> foo: ok
> foo: 700
> foo: ok
> foo: 700
> foo: ok
> foo: ok
> foo: ok
> foo: 700
> foo: 700
> foo: 700
> foo: ok
> foo: 700
> foo: 700
> foo: 700
> foo: ok
> foo: 700
> foo: ok
> foo: ok
> foo: ok
> foo: 700
> foo: ok
> foo: ok
> foo: ok
> foo: ok
> foo: ok
> foo: ok
> foo: ok
> 
>>
>> thanks,
>> Kinglong Mee
>>
>>>
>>> We should probably look at a network trace.
>>>
>>> --b.
>>>
>>>>  
>>>>  	if (attrset[2] & FATTR4_WORD2_SECURITY_LABEL)
>>>> -- 
>>>> 2.9.3
>>>>
>>>> --
>>>> To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
>>>> the body of a message to majordomo@vger.kernel.org
>>>> More majordomo info at  http://vger.kernel.org/majordomo-info.html
>>>
>>
> 
--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Kinglong Mee March 3, 2017, 1:32 p.m. UTC | #5
Ping...

What's the state? The problem is also exist in the latest kernel.

Also, the patch should be updated based on the latest kernel.

thanks,
Kinglong Mee

On 1/7/2017 22:45, Kinglong Mee wrote:
> Acorrding to Matthieu Herrb's test cases, a new created file will
> get a bad mode as 0666 (expected 0644) after commit dff25ddb4808
> "nfs: add support for the umask attribute".
> 
> It is caused by missing check of FATTR4_WORD2_MODE_UMASK
> in nfs4_exclusive_attrset.
> 
> #include <sys/types.h>
> #include <sys/stat.h>
> #include <err.h>
> #include <fcntl.h>
> #include <stdio.h>
> #include <stdlib.h>
> #include <string.h>
> #include <unistd.h>
> 
> /*
>  * Demonstrate file creation bug on NFS v4 and linux kernel 4.4+
>  *
>  * mktemp() is used on purpose.
>  */
> int
> main(int argc, char *argv[])
> {
> 	const char *name = argv[1];
> 	char tmp[] = "./tmpXXXXXXXXXX";
> 	struct stat buf;
> 	mode_t expected;
> 	int fd, i, n = 40;
> 
> 	umask(S_IWGRP | S_IWOTH);
> 	expected = 0666 & ~(S_IWGRP | S_IWOTH);
> 	if (argv[1] == NULL)
> 		name = mktemp(tmp);
> 	for (i = 0; i < n; i++) {
> 		fd = open(name, O_RDWR|O_CREAT|O_EXCL, 0666);
> 		if (fd < 0)
> 			err(1, "open %s", name);
> 		memset(&buf, 0, sizeof(buf));
> 		if (stat(name, &buf) < 0)
> 			err(1, "stat %s", name);
> 		if ((buf.st_mode & (S_IRWXU|S_IRWXG|S_IRWXO)) != expected)
> 			printf("%s: %o\n", name,
> 			    (int)buf.st_mode & (S_IRWXU|S_IRWXG|S_IRWXO));
> 		else
> 			printf("%s: ok\n", name);
> 		unlink(name);
> 	}
> 	exit(0);
> }
> 
> Signed-off-by: Kinglong Mee <kinglongmee@gmail.com>
> ---
>  fs/nfs/nfs4proc.c | 3 ++-
>  1 file changed, 2 insertions(+), 1 deletion(-)
> 
> diff --git a/fs/nfs/nfs4proc.c b/fs/nfs/nfs4proc.c
> index 6dcbc5d..a3e9ef1 100644
> --- a/fs/nfs/nfs4proc.c
> +++ b/fs/nfs/nfs4proc.c
> @@ -2697,7 +2697,8 @@ static inline void nfs4_exclusive_attrset(struct nfs4_opendata *opendata,
>  		sattr->ia_valid |= ATTR_MTIME;
>  
>  	/* Except MODE, it seems harmless of setting twice. */
> -	if ((attrset[1] & FATTR4_WORD1_MODE))
> +	if ((attrset[1] & FATTR4_WORD1_MODE) ||
> +	    (attrset[2] & FATTR4_WORD2_MODE_UMASK))
>  		sattr->ia_valid &= ~ATTR_MODE;
>  
>  	if (attrset[2] & FATTR4_WORD2_SECURITY_LABEL)
> 
--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
diff mbox

Patch

diff --git a/fs/nfs/nfs4proc.c b/fs/nfs/nfs4proc.c
index 6dcbc5d..a3e9ef1 100644
--- a/fs/nfs/nfs4proc.c
+++ b/fs/nfs/nfs4proc.c
@@ -2697,7 +2697,8 @@  static inline void nfs4_exclusive_attrset(struct nfs4_opendata *opendata,
 		sattr->ia_valid |= ATTR_MTIME;
 
 	/* Except MODE, it seems harmless of setting twice. */
-	if ((attrset[1] & FATTR4_WORD1_MODE))
+	if ((attrset[1] & FATTR4_WORD1_MODE) ||
+	    (attrset[2] & FATTR4_WORD2_MODE_UMASK))
 		sattr->ia_valid &= ~ATTR_MODE;
 
 	if (attrset[2] & FATTR4_WORD2_SECURITY_LABEL)