diff mbox series

[v3] nfs: keep server info for remounts

Message ID 20240414170109.137696-1-martin@kaiser.cx (mailing list archive)
State New
Headers show
Series [v3] nfs: keep server info for remounts | expand

Commit Message

Martin Kaiser April 14, 2024, 5:01 p.m. UTC
With newer kernels that use fs_context for nfs mounts, remounts fail with
-EINVAL.

$ mount -t nfs -o nolock 10.0.0.1:/tmp/test /mnt/test/
$ mount -t nfs -o remount /mnt/test/
mount: mounting 10.0.0.1:/tmp/test on /mnt/test failed: Invalid argument

For remounts, the nfs server address and port are populated by
nfs_init_fs_context and later overwritten with 0x00 bytes by
nfs23_parse_monolithic. The remount then fails as the server address is
invalid.

Fix this by not overwriting nfs server info in nfs23_parse_monolithic if
we're doing a remount.

Fixes: f2aedb713c28 ("NFS: Add fs_context support.")
Signed-off-by: Martin Kaiser <martin@kaiser.cx>
---
 v3:
 - rebased against linux-next from 12th April 2024

 v2:
 - rebased against linux-next from 26th February 2024

Dear all,
I'm resending this patch again. The problem that I'm trying to fix is still
present in linux-next. Thanks in advance for any reviews and comments.

I guess that we're taking this path for remounts

do_remount
    fs_context_for_reconfigure
        alloc_fs_context
            init_fs_context == nfs_init_fs_context
               fc->root is set for remounts
               ctx->nfs_server is populated
    parse_monolithic_mount_data
        nfs_fs_context_parse_monolithic
            nfs23_parse_monolithic
               ctx->nfs_server is overwritten with data from mount request

An alternative to checking for !is_remount_fc(fc) would be to check
if (ctx->nfs_server.addrlen == 0)

fs/nfs/fs_context.c | 9 ++++++---
 1 file changed, 6 insertions(+), 3 deletions(-)

Comments

Jeffrey Layton April 15, 2024, 11:17 a.m. UTC | #1
On Sun, 2024-04-14 at 19:01 +0200, Martin Kaiser wrote:
> With newer kernels that use fs_context for nfs mounts, remounts fail with
> -EINVAL.
> 
> $ mount -t nfs -o nolock 10.0.0.1:/tmp/test /mnt/test/
> $ mount -t nfs -o remount /mnt/test/
> mount: mounting 10.0.0.1:/tmp/test on /mnt/test failed: Invalid argument
> 
> For remounts, the nfs server address and port are populated by
> nfs_init_fs_context and later overwritten with 0x00 bytes by
> nfs23_parse_monolithic. The remount then fails as the server address is
> invalid.
> 
> Fix this by not overwriting nfs server info in nfs23_parse_monolithic if
> we're doing a remount.
> 
> Fixes: f2aedb713c28 ("NFS: Add fs_context support.")
> Signed-off-by: Martin Kaiser <martin@kaiser.cx>
> ---
>  v3:
>  - rebased against linux-next from 12th April 2024
> 
>  v2:
>  - rebased against linux-next from 26th February 2024
> 
> Dear all,
> I'm resending this patch again. The problem that I'm trying to fix is still
> present in linux-next. Thanks in advance for any reviews and comments.
> 
> I guess that we're taking this path for remounts
> 
> do_remount
>     fs_context_for_reconfigure
>         alloc_fs_context
>             init_fs_context == nfs_init_fs_context
>                fc->root is set for remounts
>                ctx->nfs_server is populated
>     parse_monolithic_mount_data
>         nfs_fs_context_parse_monolithic
>             nfs23_parse_monolithic
>                ctx->nfs_server is overwritten with data from mount request
> 
> An alternative to checking for !is_remount_fc(fc) would be to check
> if (ctx->nfs_server.addrlen == 0)
> 
> fs/nfs/fs_context.c | 9 ++++++---
>  1 file changed, 6 insertions(+), 3 deletions(-)
> 
> diff --git a/fs/nfs/fs_context.c b/fs/nfs/fs_context.c
> index d0a0956f8a13..cac1157be2c2 100644
> --- a/fs/nfs/fs_context.c
> +++ b/fs/nfs/fs_context.c
> @@ -1112,9 +1112,12 @@ static int nfs23_parse_monolithic(struct fs_context *fc,
>  		ctx->acdirmax	= data->acdirmax;
>  		ctx->need_mount	= false;
>  
> -		memcpy(sap, &data->addr, sizeof(data->addr));
> -		ctx->nfs_server.addrlen = sizeof(data->addr);
> -		ctx->nfs_server.port = ntohs(data->addr.sin_port);
> +		if (!is_remount_fc(fc)) {
> +			memcpy(sap, &data->addr, sizeof(data->addr));
> +			ctx->nfs_server.addrlen = sizeof(data->addr);
> +			ctx->nfs_server.port = ntohs(data->addr.sin_port);
> +		}
> +
>  		if (sap->ss_family != AF_INET ||
>  		    !nfs_verify_server_address(sap))
>  			goto out_no_address;

Doesn't nfs4_parse_monolithic need the same fix?
Martin Kaiser April 22, 2024, 10:33 p.m. UTC | #2
Thus wrote Jeff Layton (jlayton@kernel.org):

> On Sun, 2024-04-14 at 19:01 +0200, Martin Kaiser wrote:
> > With newer kernels that use fs_context for nfs mounts, remounts fail with
> > -EINVAL.

> > $ mount -t nfs -o nolock 10.0.0.1:/tmp/test /mnt/test/
> > $ mount -t nfs -o remount /mnt/test/
> > mount: mounting 10.0.0.1:/tmp/test on /mnt/test failed: Invalid argument

> > For remounts, the nfs server address and port are populated by
> > nfs_init_fs_context and later overwritten with 0x00 bytes by
> > nfs23_parse_monolithic. The remount then fails as the server address is
> > invalid.

> > Fix this by not overwriting nfs server info in nfs23_parse_monolithic if
> > we're doing a remount.

> > Fixes: f2aedb713c28 ("NFS: Add fs_context support.")
> > Signed-off-by: Martin Kaiser <martin@kaiser.cx>
> > ---
> >  v3:
> >  - rebased against linux-next from 12th April 2024

> >  v2:
> >  - rebased against linux-next from 26th February 2024

> > Dear all,
> > I'm resending this patch again. The problem that I'm trying to fix is still
> > present in linux-next. Thanks in advance for any reviews and comments.

> > I guess that we're taking this path for remounts

> > do_remount
> >     fs_context_for_reconfigure
> >         alloc_fs_context
> >             init_fs_context == nfs_init_fs_context
> >                fc->root is set for remounts
> >                ctx->nfs_server is populated
> >     parse_monolithic_mount_data
> >         nfs_fs_context_parse_monolithic
> >             nfs23_parse_monolithic
> >                ctx->nfs_server is overwritten with data from mount request

> > An alternative to checking for !is_remount_fc(fc) would be to check
> > if (ctx->nfs_server.addrlen == 0)

> > fs/nfs/fs_context.c | 9 ++++++---
> >  1 file changed, 6 insertions(+), 3 deletions(-)

> > diff --git a/fs/nfs/fs_context.c b/fs/nfs/fs_context.c
> > index d0a0956f8a13..cac1157be2c2 100644
> > --- a/fs/nfs/fs_context.c
> > +++ b/fs/nfs/fs_context.c
> > @@ -1112,9 +1112,12 @@ static int nfs23_parse_monolithic(struct fs_context *fc,
> >  		ctx->acdirmax	= data->acdirmax;
> >  		ctx->need_mount	= false;

> > -		memcpy(sap, &data->addr, sizeof(data->addr));
> > -		ctx->nfs_server.addrlen = sizeof(data->addr);
> > -		ctx->nfs_server.port = ntohs(data->addr.sin_port);
> > +		if (!is_remount_fc(fc)) {
> > +			memcpy(sap, &data->addr, sizeof(data->addr));
> > +			ctx->nfs_server.addrlen = sizeof(data->addr);
> > +			ctx->nfs_server.port = ntohs(data->addr.sin_port);
> > +		}
> > +
> >  		if (sap->ss_family != AF_INET ||
> >  		    !nfs_verify_server_address(sap))
> >  			goto out_no_address;

> Doesn't nfs4_parse_monolithic need the same fix? 

Sorry for the delayed response. It took me a moment to set up a test with nfs4
(busybox mount has no nfs4 support).

The nfs4 remounts do not fail for me. The mount syscall goes into
nfs4_parse_monolithic and 

   if (data->version != 1)                                                                                             
      return generic_parse_monolithic(fc, data);                                                                       

branches off into generic_parse_monolithic before the server address is
overwritten (this is what breaks nfs23).

Best regards,

   Martin
diff mbox series

Patch

diff --git a/fs/nfs/fs_context.c b/fs/nfs/fs_context.c
index d0a0956f8a13..cac1157be2c2 100644
--- a/fs/nfs/fs_context.c
+++ b/fs/nfs/fs_context.c
@@ -1112,9 +1112,12 @@  static int nfs23_parse_monolithic(struct fs_context *fc,
 		ctx->acdirmax	= data->acdirmax;
 		ctx->need_mount	= false;
 
-		memcpy(sap, &data->addr, sizeof(data->addr));
-		ctx->nfs_server.addrlen = sizeof(data->addr);
-		ctx->nfs_server.port = ntohs(data->addr.sin_port);
+		if (!is_remount_fc(fc)) {
+			memcpy(sap, &data->addr, sizeof(data->addr));
+			ctx->nfs_server.addrlen = sizeof(data->addr);
+			ctx->nfs_server.port = ntohs(data->addr.sin_port);
+		}
+
 		if (sap->ss_family != AF_INET ||
 		    !nfs_verify_server_address(sap))
 			goto out_no_address;