Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp4030163imm; Mon, 17 Sep 2018 07:10:19 -0700 (PDT) X-Google-Smtp-Source: ANB0VdaQ+Q9ZRaJeIXZD1tUJCaayYnvy5RN3D7vfMS3VPPdkAeY4AAkmhunC2JqWanOspmbGNE+A X-Received: by 2002:a62:438f:: with SMTP id l15-v6mr26552584pfi.196.1537193419192; Mon, 17 Sep 2018 07:10:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537193419; cv=none; d=google.com; s=arc-20160816; b=pr8Yhqt1Tv66utNbUUneWH8Z2JbKyBRLlDSOd7ZI7G66yuYf6x1hzW/kopU0AQpiyl 52/3xqBpMuaO/ZQRmNlcv0RsQ28e2r5mthKDWq+UdKsMFQONAjnBJraKUz+zurCG4g+y zRS/vSc15y3x7Yr6ZqrZ5/crpNGFhoAx5rYOJbqk55bb+VDqO+6z6A9/h8wZ8TrQQAec iyIqiDQOnObWrWTAr1eNszhIPTUMsmq1eoJeofY67AR746xjF+xQtwgE14yv6xiz4xHA FjGBszLM5Aui8zOx4h6pXWQLf01FTmjWjXptTawdH0dNUQ7Snx0Peoewa3Ivpv42mgJu lVHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=WuW/iSevKsX/ls4+uIZQwCVw9wshJoshjUtIpUU0O8o=; b=r9CX7SQ2HizsFt6knApYxDn0MGmkh0KtBEwGewBG4q72sTR4oAvoPrURmKb2+St3dB +RIjosK69GMnB/NrcgOYJ9IfrEqhLk3ZTVEE7xb2vNo7WJgy5nyAfQW4vSkKDeK2kyVa gxv/s4kSn4qJQkH9dT5rtw0aagZvZSSxvqRooZs0cZLrdCpg5BPTRrI0OO4UZs8gMPbC aITAi+feIQciy0YTLSftFwdKmy2TTb8YXvHEKVriCV52HhyJ2lTOqP/zMu9ezgd7gqi9 Zw+8lpzpCX+pyENqgWZBjwCtULpY2Br8E6tp5f2AAcYdRiONV7iri8GWodB7lqjmRsNF 7X+A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r7-v6si15596036pli.248.2018.09.17.07.09.59; Mon, 17 Sep 2018 07:10:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728720AbeIQThP (ORCPT + 99 others); Mon, 17 Sep 2018 15:37:15 -0400 Received: from smtp-out-so.shaw.ca ([64.59.136.138]:51200 "EHLO smtp-out-so.shaw.ca" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727881AbeIQThP (ORCPT ); Mon, 17 Sep 2018 15:37:15 -0400 X-Greylist: delayed 489 seconds by postgrey-1.27 at vger.kernel.org; Mon, 17 Sep 2018 15:37:14 EDT Received: from fanir.tuyoix.net ([68.150.218.192]) by shaw.ca with ESMTP id 1u5lgBf4i5Hxq1u5mgwm6i; Mon, 17 Sep 2018 08:01:36 -0600 X-Authority-Analysis: v=2.3 cv=BMcHU2YG c=1 sm=1 tr=0 a=LfNn7serMq+1bQZBlMsSfQ==:117 a=LfNn7serMq+1bQZBlMsSfQ==:17 a=JBFolyDoGHsA:10 a=nlC_4_pT8q9DhB4Ho9EA:9 a=3I1X_3ewAAAA:8 a=ourswZ7O5i2RYhpjJKcA:9 a=QEXdDO2ut3YA:10 a=VG9N9RgkD3hcbI6YpJ1l:22 Received: from CLUIJ (cluij.tuyoix.net [192.168.144.15]) (authenticated bits=0) by fanir.tuyoix.net (8.15.2/8.15.2) with ESMTPSA id w8HE1UIu026201 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 17 Sep 2018 08:01:30 -0600 Date: Mon, 17 Sep 2018 08:01:30 -0600 (Mountain Daylight Time) From: =?UTF-8?Q?Marc_Aur=C3=A8le_La_France?= To: =?UTF-8?Q?Andreas_Gr=C3=BCnbacher?= cc: Greg Kroah-Hartman , Tejun Heo , Linux Kernel Mailing List , Al Viro , Linux FS-devel Mailing List , Andreas Gruenbacher Subject: Re: sysfs: Do not return POSIX ACL xattrs via listxattr() In-Reply-To: Message-ID: References: User-Agent: Alpine 2.20 (WNT 67 2015-01-07) MIME-Version: 1.0 Content-Type: multipart/mixed; BOUNDARY="230644-14400-1537192892=:4228" X-CMAE-Envelope: MS4wfHGXgeHqqRRNhnkL8k25M0vy3NoUb1lrlM6QBddBm30KfAIrx1WHN+P/HniF0NyQFIlL5GZloqt4ssbDYWmkqJ0NWAGBwq40vhcVOtU3wU3NQfonh3G4 sLzYBGxFxktDJT/esgOwlo5diqvGm1n3MDdpRZNmxVql5z5uHffz0KS8wBgwab0xq79G26VWeldAQ4Hfr5fbKXxCjo6Rkx7GymBQQKABarZR01lvd6WPZIEC cbiW6MRBOCXZDM7PPpWxjFTpVc6NyehKTl0fJK7H0HW+AYbi4k3mVfWp9eiO+0fxM5p2W45pYKD3s0jQVAleZiu2uclqL5Cnj07kYt+KJOyNQP7QXBpuaRg3 ovImjL8cqUOz+yjD0KSMtlIIPmx81lSl33KyG+ukZ6v2VaN4wO0JBfeyt4Lo6E5VPNl86sZ6unNgnXfoZh9Q23xVZs/Xzw== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --230644-14400-1537192892=:4228 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8BIT On Mon, 10 Sep 2018, Marc Aurèle La France wrote: > On Mon, 10 Sep 2018, Andreas Grünbacher wrote: >> Am Mo., 10. Sep. 2018 schrieb Marc Aurèle La France: >>> Commit 786534b92f3ce68f4afc8a761c80b76887797b0a "tmpfs: listxattr >>> should include POSIX ACL xattrs", which first appeared in 4.5 kernels, >>> introduced a regression whereby listxattr() syscalls on anything in >>> sysfs, or its mountpoint, return the name of the two POSIX ACL xattrs, >>> but attempts to retrieve these values are denied with EOPNOTSUP. For >>> example ... >>> # getfattr -d --match=- /sys >>> /sys: system.posix_acl_access: Operation not supported >>> /sys: system.posix_acl_default: Operation not supported >>> # >> I can confirm this regression. >>> This inconsistent behaviour confuses rsync(1) (among others) when it >>> runs into a sysfs mountpoint, even when told to not descend into it. >>> This issue occurs because simple_xattr_list() does not correctly deal >>> with cached ACLs. >>> The suggested fix below was developed with a 4.18.7 kernel, but should >>> apply, modulo patch fuzz, to any kernel >= 4.7. A fix for 4.5 <= >>> kernels < 4.7 is trivially different, but I won't bother given such >>> kernels are no longer maintained. >>> Note that the only other simple_xattr_list() caller, shmem, avoids >>> this glitch by previously calling cache_no_acl() on all inodes it >>> creates, so perhaps sysfs/kernfs should do the same. >>> Signed-off-by: Marc Aurèle La France >>> --- a/fs/xattr.c >>> +++ b/fs/xattr.c >>> @@ -949,13 +949,13 @@ ssize_t simple_xattr_list(struct inode *inode, >>> int err = 0; >>> >>> #ifdef CONFIG_FS_POSIX_ACL >>> - if (inode->i_acl) { >>> + if (inode->i_acl && !is_uncached_acl(inode->i_acl)) { >>> err = xattr_list_one(&buffer, &remaining_size, >>> XATTR_NAME_POSIX_ACL_ACCESS); >>> if (err) >>> return err; >>> } >>> - if (inode->i_default_acl) { >>> + if (inode->i_default_acl && >>> !is_uncached_acl(inode->i_default_acl)) { >>> err = xattr_list_one(&buffer, &remaining_size, >>> XATTR_NAME_POSIX_ACL_DEFAULT); >>> if (err) >> This seems to be a better fix, but I haven't fully verified it, yet: >> --- a/fs/inode.c >> +++ b/fs/inode.c >> @@ -187,7 +187,8 @@ int inode_init_always(struct super_block *sb, struct >> inode->i_mapping = mapping; >> INIT_HLIST_HEAD(&inode->i_dentry); /* buggered by rcu freeing */ >> #ifdef CONFIG_FS_POSIX_ACL >> - inode->i_acl = inode->i_default_acl = ACL_NOT_CACHED; >> + inode->i_acl = inode->i_default_acl = >> + (sb->s_flags & SB_POSIXACL) ? ACL_NOT_CACHED : NULL; >> #endif >> >> #ifdef CONFIG_FSNOTIFY > Yes, that works too, and doesn't seem to cause other issues. > Tested-by: Marc Aurèle La France Anything more on this? Thanks and have a great day. Marc. --230644-14400-1537192892=:4228--