Received: by 2002:a4a:3008:0:0:0:0:0 with SMTP id q8-v6csp3521178oof; Mon, 10 Sep 2018 16:16:38 -0700 (PDT) X-Google-Smtp-Source: ANB0Vda2GWiKjHar36xp7r8pFiR+Y7fSLMEBzJs7v97Sgewq4exfUsq5w4PsYDIt3FD8rlURr9/N X-Received: by 2002:a63:b207:: with SMTP id x7-v6mr25552572pge.401.1536621397991; Mon, 10 Sep 2018 16:16:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536621397; cv=none; d=google.com; s=arc-20160816; b=hjUbBtPDD9wQ84WdyXXE5WZ5zMqR3aJ+yVYcUGD3FgN9VLhqqI2K0PfguxehUH0OAl boHtJoOLmgd4egimNAu/umChosWMhUoicObRvG6WEG2pWclXEYUPtnIueE2EjaIGklBN waHtaivDmDBYZI0epzvoO9oi3XNcI/5lNSgvSNSfZwXARoByl0RD59foB+C/FxW8XVte Ko8pd1I6RNocrQyYjoyD28nZbi6HOoVbIlkfeFw6uA9+Ji6/YMYZBEWjgs493JaFuJ/R qrRRQQLVgAZZiIrjeyTs5AyqmFirgWvOqgvsLFdNIgrP9bpgLZtNKW8mycZTHyUl4FrP FEkQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=7EssgVxG1ezAMk1HR730waRzKFYNXH/aUH5SU8OtN1U=; b=dFXrFJ5BtURCtws/Qq7XDisoM9KJNRW1t4aU0ewZIzOMl3Qd0pBOwUyaGP/0C4G7UH qpf3jAAhVtcN8B27orG26wK5Q3wa3cyXZDqqKesT9W5aCQpVwrXHjRZwTjTOrKsMVQ6N 7lRqFIXQZOFNhSrzP76LlOEZjPlG3Lky3kiuVsvUfj+WkVZ0fKzdMyLxXkYNahje/x1b Rr8ab83rmFrwAqT3CvMq4K9vAjk3Qw8FKxSBdoFen3+xDUgArOc5hfJu8SIyXlXV/RZ4 SxwjSw9f0NPg0Ym2GbWVfVcTEXUbabIsmxgKe/gmnUDhxxXK64hMvmZT1D2vyzsSdmDC hs3Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t1-v6si18505235pgg.643.2018.09.10.16.16.19; Mon, 10 Sep 2018 16:16:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726217AbeIKEMf (ORCPT + 99 others); Tue, 11 Sep 2018 00:12:35 -0400 Received: from smtp-out-no.shaw.ca ([64.59.134.9]:41944 "EHLO smtp-out-no.shaw.ca" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725735AbeIKEMf (ORCPT ); Tue, 11 Sep 2018 00:12:35 -0400 Received: from fanir.tuyoix.net ([68.150.218.192]) by shaw.ca with ESMTP id zVPgf2j06WppDzVPhfXtbr; Mon, 10 Sep 2018 17:16:14 -0600 X-Authority-Analysis: v=2.3 cv=YIcrNiOx c=1 sm=1 tr=0 a=LfNn7serMq+1bQZBlMsSfQ==:117 a=LfNn7serMq+1bQZBlMsSfQ==:17 a=JBFolyDoGHsA:10 a=nlC_4_pT8q9DhB4Ho9EA:9 a=3I1X_3ewAAAA:8 a=kPGX45PSJw8SEvEpmYoA:9 a=QEXdDO2ut3YA:10 a=VG9N9RgkD3hcbI6YpJ1l:22 Received: from CLUIJ (cluij.tuyoix.net [192.168.144.15]) (authenticated bits=0) by fanir.tuyoix.net (8.15.2/8.15.2) with ESMTPSA id w8ANG8ER009738 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 10 Sep 2018 17:16:09 -0600 Date: Mon, 10 Sep 2018 17:16:08 -0600 (Mountain Daylight Time) From: =?UTF-8?Q?Marc_Aur=C3=A8le_La_France?= To: =?UTF-8?Q?Andreas_Gr=C3=BCnbacher?= cc: Greg Kroah-Hartman , Tejun Heo , Linux Kernel Mailing List , Al Viro , Linux FS-devel Mailing List , Andreas Gruenbacher Subject: Re: sysfs: Do not return POSIX ACL xattrs via listxattr() In-Reply-To: Message-ID: References: User-Agent: Alpine 2.20 (WNT 67 2015-01-07) MIME-Version: 1.0 Content-Type: multipart/mixed; BOUNDARY="476518-19365-1536621371=:3100" X-CMAE-Envelope: MS4wfCkjyAiXT5uFA36J9YOKi46bx4Eql/D5pmL2b8Vg+/BjzcGJeLJoQ4L7qyV9II1XBjj8fw951bSHBkcp6nolPJvv4PGWZqoVaDxUtGyjEY/v6keLgQcE 2REnGb1DVJgBlIii/y+6G3Vp78JYL+p8V6xRURfMjREexyoYYwulQ2ctGuq0lWDhLq0NVSXCvxhudwQVyZ6GN0TnTRR9iMGYGejX/854bB47pnnM1S03GHo6 /cH6wk3t8g8cozRzBtFCdvYz6NA5JTg1ANxVGpA8PTNLGakTuE62m5+b12UkwwV4NUpdjPQ8xsMjdCmnxbPJq3W21pc1VRbKI+s5sC+T6IK1oEHWsVyGLgDN Cwe7ro/BWRk3jV8NkhumC+KtOlfSAnxtaKGFRb4fqP9bGvXH0e2Jug4/eemnLRrd9CEgO1ufqGQrtb1whimX8G5+bhQtCA== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --476518-19365-1536621371=:3100 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8BIT On Mon, 10 Sep 2018, Andreas Grünbacher wrote: > Am Mo., 10. Sep. 2018 schrieb Marc Aurèle La France: >> Commit 786534b92f3ce68f4afc8a761c80b76887797b0a "tmpfs: listxattr >> should include POSIX ACL xattrs", which first appeared in 4.5 kernels, >> introduced a regression whereby listxattr() syscalls on anything in >> sysfs, or its mountpoint, return the name of the two POSIX ACL xattrs, >> but attempts to retrieve these values are denied with EOPNOTSUP. For >> example ... >> # getfattr -d --match=- /sys >> /sys: system.posix_acl_access: Operation not supported >> /sys: system.posix_acl_default: Operation not supported >> # > I can confirm this regression. >> This inconsistent behaviour confuses rsync(1) (among others) when it >> runs into a sysfs mountpoint, even when told to not descend into it. >> This issue occurs because simple_xattr_list() does not correctly deal >> with cached ACLs. >> The suggested fix below was developed with a 4.18.7 kernel, but should >> apply, modulo patch fuzz, to any kernel >= 4.7. A fix for 4.5 <= >> kernels < 4.7 is trivially different, but I won't bother given such >> kernels are no longer maintained. >> Note that the only other simple_xattr_list() caller, shmem, avoids >> this glitch by previously calling cache_no_acl() on all inodes it >> creates, so perhaps sysfs/kernfs should do the same. >> Signed-off-by: Marc Aurèle La France >> --- a/fs/xattr.c >> +++ b/fs/xattr.c >> @@ -949,13 +949,13 @@ ssize_t simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs, >> int err = 0; >> >> #ifdef CONFIG_FS_POSIX_ACL >> - if (inode->i_acl) { >> + if (inode->i_acl && !is_uncached_acl(inode->i_acl)) { >> err = xattr_list_one(&buffer, &remaining_size, >> XATTR_NAME_POSIX_ACL_ACCESS); >> if (err) >> return err; >> } >> - if (inode->i_default_acl) { >> + if (inode->i_default_acl && !is_uncached_acl(inode->i_default_acl)) { >> err = xattr_list_one(&buffer, &remaining_size, >> XATTR_NAME_POSIX_ACL_DEFAULT); >> if (err) > This seems to be a better fix, but I haven't fully verified it, yet: > --- a/fs/inode.c > +++ b/fs/inode.c > @@ -187,7 +187,8 @@ int inode_init_always(struct super_block *sb, struct > inode->i_mapping = mapping; > INIT_HLIST_HEAD(&inode->i_dentry); /* buggered by rcu freeing */ > #ifdef CONFIG_FS_POSIX_ACL > - inode->i_acl = inode->i_default_acl = ACL_NOT_CACHED; > + inode->i_acl = inode->i_default_acl = > + (sb->s_flags & SB_POSIXACL) ? ACL_NOT_CACHED : NULL; > #endif > > #ifdef CONFIG_FSNOTIFY Yes, that works too, and doesn't seem to cause other issues. Tested-by: Marc Aurèle La France Thanks. Marc. --476518-19365-1536621371=:3100--