Received: by 2002:a05:6a10:eb17:0:0:0:0 with SMTP id hx23csp204183pxb; Thu, 2 Sep 2021 23:41:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxdi0iw2+vldfLwBEwXcQTjRi6Ct3zhlH54MyvxAkJe0c4gMErNmTkbm0L8Wj/4jPPel58L X-Received: by 2002:a6b:6a14:: with SMTP id x20mr1933780iog.177.1630651280741; Thu, 02 Sep 2021 23:41:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1630651280; cv=none; d=google.com; s=arc-20160816; b=qCBEH2O5U0zLYIQ1rgGSrEOMYWrDCWjNCCGfjWJRseDjRnjIEcrEgrikFGyhp+Tf19 Z05Glb+iRUg0nS18NLR4558z6xFnDBTuYWOL+gTrStUvk0USiQVDYVhcy7tWzgrkcD1I kGqtfI6Ra6JSIFkrh0XXa9NHwMtCm8Hsphyt+/URr7gzB8BxJWzXMg2bFzI5m1G5W+Cq cwS3qTbmbyuqSpMIvtq0ExDiihe1vD10CD/uD/4nxf6cu5duIzIcDTAHlZZky4yZVJBb sUjpkdyqVasWoDj1VoSTdBhhrxtm2Y6iMOUE88uID+FnhbzWvKBdJkNfrQajqi8lDsI3 l31w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=YC/rlauU/F6bmxF77VH11Mgk4hV/IwCNeLbfbf9xP5Q=; b=U251XruALA7uWfOOpjkW1Dg9lHYs7TbLfEcVJB4Kx8fWBQaDlyHIxt+yMNOOFULhTj vQ082MbjHZI8Ie2KU+2UhMquMFHpvwWdhjRUxWO1kmi27urvRINdqZfdZnkNxgR0C1U2 CtRH7b8XkRWLqkq+Q/us66Zx19DbNyLeZX8yt+7MHuoNYH8oaO5yApxgWV83PHWRTT1A i3f4/zY1dcEMSZPSn/jEH4Dyag2iO71KUvvibw5gVS7tzKsAaEfm6i8JZowgKBc5PDQC jtwaMQ5o1TgO0E5xhtisdqGR0CbLOzBQq4MnfL0iawkWaKwqEGSH4ImScc/zbMZX/2f2 3ZuQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=TOQpwkyA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e2si3956120jaa.68.2021.09.02.23.41.09; Thu, 02 Sep 2021 23:41:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=TOQpwkyA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346181AbhICGcR (ORCPT + 99 others); Fri, 3 Sep 2021 02:32:17 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:26284 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345298AbhICGcQ (ORCPT ); Fri, 3 Sep 2021 02:32:16 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1630650676; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=YC/rlauU/F6bmxF77VH11Mgk4hV/IwCNeLbfbf9xP5Q=; b=TOQpwkyAxLvlzLXRWkCbVCeCE5dtwOipp3KfMhTsZZgmgHMxaieBsuxMJzqrnQfcsL6c0N huctH7dsYXwGeLBp3QUFM3WJZL2yy5kmqNObe34UxLW044/QGVB8c3PH4JhLTG2UBkmogS 9cpVbrT35Gfo9TDhAaU5Ue5gIce+bdg= Received: from mail-wm1-f69.google.com (mail-wm1-f69.google.com [209.85.128.69]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-450-t6gqjXUNPEWe7RXwIgpZUw-1; Fri, 03 Sep 2021 02:31:15 -0400 X-MC-Unique: t6gqjXUNPEWe7RXwIgpZUw-1 Received: by mail-wm1-f69.google.com with SMTP id c4-20020a1c9a04000000b002e864b7edd1so1544923wme.6 for ; Thu, 02 Sep 2021 23:31:15 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=YC/rlauU/F6bmxF77VH11Mgk4hV/IwCNeLbfbf9xP5Q=; b=rPAKsSt0nP5JT+UXV+Wnr9dFv6KFKznGiC5+fNMseOzaIT+/fi2DYE5g0Thh9Vsdkc 9Sd8k960mx+uR9Xs0/lEddgkw03ScTPtOFKjEXCxvvYoQkjW/AaA0y6uSD9m43EBCb0n aY3zJf++69mwLUfc0zMvRZdJBDjpK7Vvu+te2OcWt1iqWy8wj43xbrk2j8rH5/qyIk5J wfWd86DtyKtUr5vrWf7Id8+Q9FzbRauz63cUpgoUt+R9vTxCFZEjAXvL03SH2d9JPfZY 8qVEghRFdaNJ8j4Kd1jYxhkNAnIf9MebGoyRngr6uN7e0sHXRPfTT9a34IoGqBRn70/y FGxg== X-Gm-Message-State: AOAM531NKAl84GUyHUG1YVO5aqlvde8pgSYGA/kOmw3VCWWP5D3ZOvA1 mGRHUiB99Lm0sisICaauDDQPZBhA2IKOtFsD/3C5rkMe/1w3QOkoqalKK98BUDP+F+5G8/4yD1M jk22P4rsLHy+JA763BNxrmkWGu71bhpXTNuEPq6qa X-Received: by 2002:adf:d193:: with SMTP id v19mr2009427wrc.377.1630650674695; Thu, 02 Sep 2021 23:31:14 -0700 (PDT) X-Received: by 2002:adf:d193:: with SMTP id v19mr2009383wrc.377.1630650674468; Thu, 02 Sep 2021 23:31:14 -0700 (PDT) MIME-Version: 1.0 References: <20210902152228.665959-1-vgoyal@redhat.com> In-Reply-To: From: Andreas Gruenbacher Date: Fri, 3 Sep 2021 08:31:03 +0200 Message-ID: Subject: Re: [PATCH 3/1] xfstests: generic/062: Do not run on newer kernels To: Vivek Goyal Cc: fstests , linux-fsdevel , LKML , virtio-fs@redhat.com, dwalsh@redhat.com, dgilbert@redhat.com, christian.brauner@ubuntu.com, casey.schaufler@intel.com, LSM , selinux@vger.kernel.org, "Theodore Ts'o" , Miklos Szeredi , gscrivan@redhat.com, "Fields, Bruce" , stephen.smalley.work@gmail.com, Dave Chinner , Alexander Viro Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 2, 2021 at 5:47 PM Vivek Goyal wrote: > xfstests: generic/062: Do not run on newer kernels > > This test has been written with assumption that setting user.* xattrs will > fail on symlink and special files. When newer kernels support setting > user.* xattrs on symlink and special files, this test starts failing. It's actually a good thing that this test case triggers for the kernel change you're proposing; that change should never be merged. The user.* namespace is meant for data with the same access permissions as the file data, and it has been for many years. We may have applications that assume the existing behavior. In addition, this change would create backwards compatibility problems for things like backups. I'm not convinced that what you're actually proposing (mapping security.selinux to a different attribute name) actually makes sense, but that's a question for the selinux folks to decide. Mapping it to a user.* attribute is definitely wrong though. The modified behavior would affect anybody, not only users of selinux and/or virtiofs. If mapping attribute names is actually the right approach, then you need to look at trusted.* xattrs, which exist specifically for this kind of purpose. You've noted that trusted.* xattrs aren't supported over nfs. That's unfortunate, but not an acceptable excuse for messing up user.* xattrs. Thanks, Andreas