diff mbox

nfs: handle servers that support either ALLOW or DENY ACE types.

Message ID 1390535453-15585-1-git-send-email-malahal@us.ibm.com (mailing list archive)
State New, archived
Headers show

Commit Message

malahal naineni Jan. 24, 2014, 3:50 a.m. UTC
Currently we support ACLs if the NFS server file system supports
ALLOW and DENY ACE types. This patch makes the Linux client work with
ACLs if the server supports either ALLOW or DENY ACE types.

Signed-off-by: Malahal Naineni <malahal@us.ibm.com>
---
 fs/nfs/nfs4proc.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

Comments

Trond Myklebust Jan. 24, 2014, 5:31 a.m. UTC | #1
On Jan 23, 2014, at 20:50, Malahal Naineni <malahal@us.ibm.com> wrote:

> Currently we support ACLs if the NFS server file system supports
> ALLOW and DENY ACE types. This patch makes the Linux client work with
> ACLs if the server supports either ALLOW or DENY ACE types.

According to RFC5661, the behaviour if you don’t have ALLOW aces is to deny all access. How does it make sense to accept that?

--
Trond Myklebust
Linux NFS client maintainer

--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
malahal naineni Jan. 24, 2014, 2:28 p.m. UTC | #2
Trond Myklebust [trond.myklebust@primarydata.com] wrote:
> 
> On Jan 23, 2014, at 20:50, Malahal Naineni <malahal@us.ibm.com> wrote:
> 
> > Currently we support ACLs if the NFS server file system supports
> > ALLOW and DENY ACE types. This patch makes the Linux client work with
> > ACLs if the server supports either ALLOW or DENY ACE types.
> 
> According to RFC5661, the behaviour if you don’t have ALLOW aces is to deny all access. How does it make sense to accept that?

I have a server that only returned 'ALLOW' type support probably due to
a bug!  There is nothing in the spec that said a server 'MUST' support
'ALLOW' and 'DENY' ACE types (RFC5661 does say 'SHOULD' though!). That
was my reasoning to fix the client to be more liberal/lenient.

Can a server implicitly construct 'ALLOW' ACEs based on mode and not
support explicitly setting such ACEs by a client? I am not too familiar
with ACLs, if you think we should only check for 'ALLOW' support flag, I
can re-spin the patch but I think it is better to be more lenient
specially if it is not incorrect by being more lenient!

Please let me know either way.

Regards, Malahal.

--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Trond Myklebust Jan. 24, 2014, 4:11 p.m. UTC | #3
On Jan 24, 2014, at 7:28, Malahal Naineni <malahal@us.ibm.com> wrote:

> Trond Myklebust [trond.myklebust@primarydata.com] wrote:
>> 
>> On Jan 23, 2014, at 20:50, Malahal Naineni <malahal@us.ibm.com> wrote:
>> 
>>> Currently we support ACLs if the NFS server file system supports
>>> ALLOW and DENY ACE types. This patch makes the Linux client work with
>>> ACLs if the server supports either ALLOW or DENY ACE types.
>> 
>> According to RFC5661, the behaviour if you don’t have ALLOW aces is to deny all access. How does it make sense to accept that?
> 
> I have a server that only returned 'ALLOW' type support probably due to
> a bug!  There is nothing in the spec that said a server 'MUST' support
> 'ALLOW' and 'DENY' ACE types (RFC5661 does say 'SHOULD' though!). That
> was my reasoning to fix the client to be more liberal/lenient.
> 
> Can a server implicitly construct 'ALLOW' ACEs based on mode and not
> support explicitly setting such ACEs by a client? I am not too familiar
> with ACLs, if you think we should only check for 'ALLOW' support flag, I
> can re-spin the patch but I think it is better to be more lenient
> specially if it is not incorrect by being more lenient!

The way I read the spec, the default behaviour is to disallow access unless you have sufficient ALLOW aces for the behaviour that you want. The DENY aces are optional, and are there in order to explicitly deny a user or group a particular behaviour that they would otherwise be allowed due to some subsequent combination of ALLOW aces.

So, I accept that a server could function while only supporting ALLOW aces, but I don’t see how it could work at all with only DENY ace support.

Cheers
  Trond
--
Trond Myklebust
Linux NFS client maintainer

--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
malahal naineni Jan. 24, 2014, 5:17 p.m. UTC | #4
Trond Myklebust [trond.myklebust@primarydata.com] wrote:
> 
> On Jan 24, 2014, at 7:28, Malahal Naineni <malahal@us.ibm.com> wrote:
> 
> > Trond Myklebust [trond.myklebust@primarydata.com] wrote:
> >> 
> >> On Jan 23, 2014, at 20:50, Malahal Naineni <malahal@us.ibm.com> wrote:
> >> 
> >>> Currently we support ACLs if the NFS server file system supports
> >>> ALLOW and DENY ACE types. This patch makes the Linux client work with
> >>> ACLs if the server supports either ALLOW or DENY ACE types.
> >> 
> >> According to RFC5661, the behaviour if you don’t have ALLOW aces is to deny all access. How does it make sense to accept that?
> > 
> > I have a server that only returned 'ALLOW' type support probably due to
> > a bug!  There is nothing in the spec that said a server 'MUST' support
> > 'ALLOW' and 'DENY' ACE types (RFC5661 does say 'SHOULD' though!). That
> > was my reasoning to fix the client to be more liberal/lenient.
> > 
> > Can a server implicitly construct 'ALLOW' ACEs based on mode and not
> > support explicitly setting such ACEs by a client? I am not too familiar
> > with ACLs, if you think we should only check for 'ALLOW' support flag, I
> > can re-spin the patch but I think it is better to be more lenient
> > specially if it is not incorrect by being more lenient!
> 
> The way I read the spec, the default behaviour is to disallow access unless you have sufficient ALLOW aces for the behaviour that you want. The DENY aces are optional, and are there in order to explicitly deny a user or group a particular behaviour that they would otherwise be allowed due to some subsequent combination of ALLOW aces.
> 
> So, I accept that a server could function while only supporting ALLOW aces, but I don’t see how it could work at all with only DENY ace support.

Fair enough!

--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
diff mbox

Patch

diff --git a/fs/nfs/nfs4proc.c b/fs/nfs/nfs4proc.c
index 15052b8..4504685 100644
--- a/fs/nfs/nfs4proc.c
+++ b/fs/nfs/nfs4proc.c
@@ -4321,9 +4321,9 @@  static int nfs4_proc_renew(struct nfs_client *clp, struct rpc_cred *cred)
 
 static inline int nfs4_server_supports_acls(struct nfs_server *server)
 {
-	return (server->caps & NFS_CAP_ACLS)
-		&& (server->acl_bitmask & ACL4_SUPPORT_ALLOW_ACL)
-		&& (server->acl_bitmask & ACL4_SUPPORT_DENY_ACL);
+	return server->caps & NFS_CAP_ACLS &&
+			(server->acl_bitmask & ACL4_SUPPORT_ALLOW_ACL ||
+			 server->acl_bitmask & ACL4_SUPPORT_DENY_ACL);
 }
 
 /* Assuming that XATTR_SIZE_MAX is a multiple of PAGE_SIZE, and that