[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <8736xjdbka.fsf@xmission.com>
Date: Mon, 18 Jun 2018 16:33:41 -0500
From: ebiederm@...ssion.com (Eric W. Biederman)
To: David Howells <dhowells@...hat.com>
Cc: viro@...iv.linux.org.uk, linux-fsdevel@...r.kernel.org,
linux-afs@...ts.infradead.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH 00/32] VFS: Introduce filesystem context [ver #8]
David Howells <dhowells@...hat.com> writes:
> Eric W. Biederman <ebiederm@...ssion.com> wrote:
>
>> I have read through these patches and I noticed a significant issue.
>>
>> Today in mount_bdev we do something that looks like:
>>
>> mount_bdev(...)
>> {
>> s = sget(..., bdev);
>> if (s->s_root) {
>> /* Noop */
>> } else {
>> err = fill_super(s, ...);
>> if (err) {
>> deactivate_locked_super(s);
>> return ERR_PTR(err);
>> }
>> s->s_flags |= SB_ATTIVE;
>> bdev->bd_super = s;
>> }
>> return dget(s->s_root);
>> }
>>
>> The key point is that we don't process the mount options at all if
>> a super block already exists in the kernel. Similar to what
>> your fscontext changes are doing (after parsing the options).
>
> Actually, no, that's not the case.
>
> The fscontext code *requires* you to parse the parameters *before* any attempt
> to access the superblock is made. Note that this will actually be a problem
> for, say, ext4 which passes a text string stored in the superblock through the
> parser *before* parsing the mount syscall data. Fun.
>
> I'm intending to deal with that particular case by having ext4 create multiple
> private contexts, one filled in from the user data, and then a second one
> filled in from the superblock string. These can then be validated one against
> the other before the super_block struct is published.
>
> And if the super_block struct already exists, the user's specified parameters
> can be validated against that.
I did not say parse. I said process. My meaning is that today
on a second mount of a filesystem like ext2. But really most of them we
ignore those options.
>> Your fscontext changes do not improve upon this area of the mount api at
>> all and that concerns me. This is an area where people can and already
>> do shoot themselves in their feet.
>
> This *will* be dealt with, but I wanted to get the core changes upstream
> before tackling all the filesystems. The legacy wrapper is just that and
> should be got rid of when all the filesystems have been converted.
This is an area where you are making things explicit, where before
there was no way to talk about this. For filesystems that are in
legacy mode I realize we might miss this corner case, but we should
still think about it and handle it. The proc filesystem has the same
behavior and it is one you are converting.
>> ...
>>
>> Creating a new mount and finding an old mount are the same operation in
>> the kernel today. This is fundamentally confusing. In the new api
>> could we please separate these two operations?
>>
>> Perhaps someting like:
>> x create
>> x find
>>
>> With the "x create" case failing if the filesystem already exists,
>> still allowing "x find"? And with the "x find" case failing if
>> the superblock is not already created in the kernel.
>
> No. What you're suggesting introduces a userspace-userspace and a
> userspace-kernel race - unless you're willing to let userspace lock against
> superblock creation by other parties.
>
> Further, some filesystems *have* to be parameterised before you can do the
> check for the superblock. Network filesystems, for example, where you have to
> set the network parameters upfront and the key to the superblock might not be
> known until you've queried the server.
I am not talking about skipping the parameterization. I am talking
about actually acting on those options. Parsing and validating them
ahead of time is not my concern. When we make the super block
honor those options is my concern.
Further I am not suggesting something that has a meaningful race.
I am suggesting some that is the equivalent of the O_EXCL logic.
I am proposing that "x create" fail if the superblock already exists
in the kernel. I am proposing that "x find" will fail if the
superblock does not already exist.
In the worst case you have to iterate a time or two when another
user is racing with you to create the super block. But this
gives you very valuable information. Knowledge of if the superblock
is honoring all of your specified mount options or not.
It removes an existing nasty race today where people think they mount a
filesystem like "proc" with one set of options and those options are
ignored because an internal kernel mount already exists.
This is at the level of the fscontext API.
I don't care what filesystems that have not been updated to fscontext
do. I just want to avoid the nasty nasty confusion that is possible
with the existing API.
My motivation is I am in the middle of closing a regression in option
parsing in proc that caused a security option to get ignored.
I would be happy even with a result value of "x create" that told
reported if the superbloc "created" or "found". Instead of having two
different options.
But I want to be able to say to userspace very clearly. If this
superblock already exists. You need to go through the
remount/reconfigure code path to change it's options.
>> That should make it clear to a userspace program what is going on
>> and give it a chance to mount a filesystem anyway.
>
> That said, I'm willing to provide a "fail if already extant" option if we
> think that's actually likely to be of use. However, you'd still have to
> provide parameters before the check can be made.
Yes that is what I am asking for, though very much not optionally. It
is a rare case and it succeeds in the wrong way today. Letting people
think they have set a mount option when they have not.
>> In a similar vein could we please clarify the rules for changing mount
>> options for an existing superblock are in the new api?
>
> You mean remount/reconfigure? Note that we have to provide backward
> compatibility with every single filesystem.
Yes. I am thinking explicitly of reconfigure. The old remount
can do whatever is backwards compatible.
>> Today mount assumes that it has to provide all of the existing options to
>> reconfigure a mount. What people want to do and what most filesystems
>> support is just specifying the options that need to be changed. Can we
>> please make this the rule of how this are expected to work for fscontext?
>> That only changing mount options need to be specified before: "x
>> reconfigure"
>
> Fine by me - but it must *also* support every option being specified if that
> is what mount currently does.
Yes. That is what ext4 and xfs support today.
I just want it clear that at least if you use the new reconfigure
interface that you can expect options you have not specified to remain
the same instead of reverting to a default state.
> I don't really want to supply extra parsers if I can avoid it. Miklós, for
> example wanted a different, incompatible interface, so you'd do:
>
> write(fd, "o +foo");
> write(fd, "o -bar");
> write(fd, "x reconfig");
>
> sort of thing to enable or disable options... but this assumes that options
> are binary and requires a separate parser to the one that does the initial
> configuration - and you still have to support the old remount data parse.
>
> I'm okay with specifying that you should just specify the options you want to
> change and that the normal way to 'disable' something is to prefix it with
> "no".
Yes. That is what I am asking for. Just so we don't need to specify
the options that are staying the same.
> I guess I could pass a flag through to indicate that this came from
> sys_mount(MS_REMOUNT) rather than the new method.
I don't think that would be needed. As some of the most common
filesystems implement this semantic already for sys_mount(MS_REMOUNT).
What I think we might need is to cache the option string during the
transition for unconverted filesystems so that we can give then a full
set of options. So that if we have an unconverted filesystem like
devpts that assumes a missing option should be set to it's default value
we won't break it.
Eric
Powered by blists - more mailing lists