Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.

Bug 1116616

Summary: Can set illegal mount option parameter which is ignored without any warning
Product: [Retired] oVirt Reporter: Aharon Canan <acanan>
Component: ovirt-engine-coreAssignee: Tal Nisan <tnisan>
Status: CLOSED NOTABUG QA Contact: Aharon Canan <acanan>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 3.5CC: amureini, bugs, gamado, gklein, iheim, rbalakri, tnisan, yeylon
Target Milestone: ---   
Target Release: 3.5.1   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: storage
Fixed In Version: Doc Type: Bug Fix
Doc Text:
In NFS storage domains we validate that the following custom mount options are NOT specified since they are already managed and specified automatically: timeo, retrans, vfs_type, protocol_version, nfsvers, vers, minorversion, addr, clientaddr For Posix storage domains: vfs_type, addr, clientaddr
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-11-23 20:36:26 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: Storage RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1193195    
Attachments:
Description Flags
logs none

Description Aharon Canan 2014-07-06 14:42:52 UTC
Created attachment 914955 [details]
logs

Description of problem:
We can set illegal NFS mount advanced parameters which are ignored and we are not aware of it.

Version-Release number of selected component (if applicable):
ovirt 3.5 beta

How reproducible:
100%

Steps to Reproduce:
1. Create NFS SD with advanced parameter Retransmissions=A
2.
3.

Actual results:
We do not get any warning nor blocked with CanDoaction, mount succeed with default value

Expected results:
We should get warning about setting default value instead of the wrong one or we should be blocked.

Additional info:

Comment 1 Allon Mureinik 2014-07-06 16:53:55 UTC
By design, engine does NOT parse mount options, as the entire point of this feature is to allow vendor specific configurations. Having the engine parse these options will, by design, mean that the engine limits the values you may pass. So this cannot be handled in a CDA.

However, I fail to understand why VDSM doesn't fail with an "an incorrect mount option was specified".

Comment 2 Gal Amado 2014-09-08 03:51:38 UTC
*** Bug 1129398 has been marked as a duplicate of this bug. ***

Comment 3 Allon Mureinik 2014-11-20 13:24:06 UTC
Tal, IIUC, we should already block retransmissions, no?

Comment 4 Tal Nisan 2014-11-20 13:38:59 UTC
"retrans" to be precise, but it doesn't block you from specifying non managed NFS options with an incorrect value, although as stated those options should probably not and more likely can't be parsed and validated

Comment 5 Allon Mureinik 2014-11-23 20:36:26 UTC
So this is not a bug - closing.
Please add the doctext to specify what validations we DO handle, and what we leave to the mount command to handle (or ignore)