Received: by 10.192.165.156 with SMTP id m28csp212398imm; Sun, 15 Apr 2018 21:20:19 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/DmhBB9nKS3igZIte7gzOSsDMGvp4F2xEU/nsVdO3SL0qlKpE22qM5TyCNWGh24Uf7iKH3 X-Received: by 2002:a17:902:1681:: with SMTP id h1-v6mr13905354plh.145.1523852419891; Sun, 15 Apr 2018 21:20:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523852419; cv=none; d=google.com; s=arc-20160816; b=boWT7wkEQGsLkGBhgK9QDaAZm60xvS4BJemFo2szkazvWlLzzkSK4JA45PEtAsGGey Y1pjcM4hKU+0l6SPx9gGNwG8pwo+uEEFAkz/Z0ha11x0P7KVAt3XTABpqeGGrFe0R+xb ZKXrr4mAcFzjOgKc+l3UnkdzQ8f9XtBaFcdQ5GXB3X2IG0QwlDtcxyFgWPuwOuXzggVj nlS1DwAzcvE0wDaLzA+DGE7hY218z1zYzZU4bCIxLA+U+pOKkocRXLjiVdcURopbaow+ vHSoqgDShm1FJ/OXppqlJXqUcYcb5K+OW64JI/Y277M1f5cOuHN6F6GX0DnPeAYtuDbO ASBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=HQyRLtTH+/0XxANQLVPxgROgdETDg8oNHwd9K9mqepg=; b=t49sbfrnhTDY69smcA1YLdqNt4wMy6p1QjQQXozI/zsQCCabD40fC6W0XQ5ZIp+h9/ uBMvW15jhHfeDUJSxlY3nV17cYtOrNcrPt4jVwwhS8ijUSc27/kyhG9xqOvp/27nPWMu gAjLxfkg3g8EbDuOM/3A1bbeVIqiolLkVO7WJ24cx0ByYhJWrzQqgjV1zXvZxS98LKM8 sW/w0Mh9zRrwAeM3XS92zCUDhtzwVKSE31HO1viQMLS/RZVc2JWzfPzX21+j1hevKu4j /RBCru+C4fuv/ipMn12C1XqdMsAXUAV0Tr68/mc8qrZbXeHPFoheb357HXD6nsmPs5/0 rjkg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 19si8719078pgg.395.2018.04.15.21.20.05; Sun, 15 Apr 2018 21:20:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753707AbeDPEPW (ORCPT + 99 others); Mon, 16 Apr 2018 00:15:22 -0400 Received: from smtp4.ccs.ornl.gov ([160.91.203.40]:35548 "EHLO smtp4.ccs.ornl.gov" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753598AbeDPEPT (ORCPT ); Mon, 16 Apr 2018 00:15:19 -0400 Received: from star.ccs.ornl.gov (star.ccs.ornl.gov [160.91.202.134]) by smtp4.ccs.ornl.gov (Postfix) with ESMTP id B6AB11005192; Mon, 16 Apr 2018 00:15:12 -0400 (EDT) Received: by star.ccs.ornl.gov (Postfix, from userid 2004) id B35AD1F3; Mon, 16 Apr 2018 00:15:12 -0400 (EDT) From: James Simmons To: Greg Kroah-Hartman , devel@driverdev.osuosl.org, Andreas Dilger , Oleg Drokin , NeilBrown Cc: Linux Kernel Mailing List , Lustre Development List , Robin Humble , James Simmons Subject: [PATCH 06/22] staging: lustre: llite: Remove filtering of seclabel xattr Date: Mon, 16 Apr 2018 00:14:55 -0400 Message-Id: <1523852111-17321-7-git-send-email-jsimmons@infradead.org> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1523852111-17321-1-git-send-email-jsimmons@infradead.org> References: <1523852111-17321-1-git-send-email-jsimmons@infradead.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Robin Humble The security.capability xattr is used to implement File Capabilities in recent Linux versions. Capabilities are a fine grained approach to granting executables elevated privileges. eg. /bin/ping can have capabilities cap_net_admin, cap_net_raw+ep instead of being setuid root. This xattr has long been filtered out by llite, initially for stability reasons (b15587), and later over performance concerns as this xattr is read for every file with eg. 'ls --color'. Since LU-2869 xattr's are cached on clients, alleviating most performance concerns. Removing llite's filtering of the security.capability xattr enables using Lustre as a root filesystem, which is used on some large clusters. Signed-off-by: Robin Humble Intel-bug-id: https://jira.hpdd.intel.com/browse/LU-9562 Reviewed-on: https://review.whamcloud.com/27292 Reviewed-by: John L. Hammond Reviewed-by: Sebastien Buisson Reviewed-by: Oleg Drokin Signed-off-by: James Simmons --- drivers/staging/lustre/lustre/llite/xattr.c | 9 --------- 1 file changed, 9 deletions(-) diff --git a/drivers/staging/lustre/lustre/llite/xattr.c b/drivers/staging/lustre/lustre/llite/xattr.c index 2d78432..55a19a5 100644 --- a/drivers/staging/lustre/lustre/llite/xattr.c +++ b/drivers/staging/lustre/lustre/llite/xattr.c @@ -117,11 +117,6 @@ static int xattr_type_filter(struct ll_sb_info *sbi, (handler->flags == XATTR_LUSTRE_T && !strcmp(name, "lov")))) return 0; - /* b15587: ignore security.capability xattr for now */ - if ((handler->flags == XATTR_SECURITY_T && - !strcmp(name, "capability"))) - return 0; - /* LU-549: Disable security.selinux when selinux is disabled */ if (handler->flags == XATTR_SECURITY_T && !selinux_is_enabled() && strcmp(name, "selinux") == 0) @@ -383,10 +378,6 @@ static int ll_xattr_get_common(const struct xattr_handler *handler, if (rc) return rc; - /* b15587: ignore security.capability xattr for now */ - if ((handler->flags == XATTR_SECURITY_T && !strcmp(name, "capability"))) - return -ENODATA; - /* LU-549: Disable security.selinux when selinux is disabled */ if (handler->flags == XATTR_SECURITY_T && !selinux_is_enabled() && !strcmp(name, "selinux")) -- 1.8.3.1