Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp2183107pxb; Fri, 25 Mar 2022 12:34:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz9qzhYDzUQO+gDvg0yzJ8rnGTYM2PLCckC/3OFeXoj7EkSNqvJlU9rLm++dSBiFk1/ZpcV X-Received: by 2002:a17:903:18b:b0:154:4d7a:1bac with SMTP id z11-20020a170903018b00b001544d7a1bacmr13517839plg.0.1648236865187; Fri, 25 Mar 2022 12:34:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648236865; cv=none; d=google.com; s=arc-20160816; b=T/xgAgACAzwQ6poW/egHS6zd6MRyA/aZx6W8PDyJoIHDK8nTkfueO7Vn3uKKA/klwz 2kHvCh3OuyhHGeimtSZwabuVo14ghMpRfqSZcBWrDDDlOiomrkiu1lFtB7UvQyoEcvar BLnmG5SXrwhHSzl20N73fveteK0YSLfUxe78NuvcVeiHo1tl4ONeAYhcAdWqEtrB3NaI NqqS1vDSHBUktp73HeEmd0mOSwjTHgGTB4bXmExNKxpO6jHks1B42uEsLF5dEMLkpopz +jtqg7fZ7A0OvQpodR3Yc74fWATO1ymHsl98L6PiRBYou8UQXbgzgS2F7YqwG6IWK8oS SheA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=urG7wJTk7cfW0/ofN6lIZchUSJr5GfrgF/MGHRkbzfo=; b=1HsbaiPZQ1u7rNhsgfxoL+N1tD6DfXTB8+RFjamjsZqAOZx2mwlR+IQT1BrQzv8M+4 I4TpNPLGCTMPxlqCIg6WYG0TIDWF6b2IFa6i62dKC8LyZ1+wPZEef/mCN1ydlb7LRAzH 8TRjhh/PQmQx1OlOP1EYnIO8jvuslzReCH2rBqd0XoFFxjeGaAfMLt7PlohZbHVjpo0N 6omD5clms2gyJuN9p+icR3rZUVyfbMUIQWC6Ls8wCnP5+orZyhGptQmGCwj7wjaBlk0h Pbhec4N0n4oDuzg+slQ0TpTNY7OLaz8Y44s4BjRZyAXWmOk23gwL1hLxLN/7emUelsl1 GEqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore-com.20210112.gappssmtp.com header.s=20210112 header.b=0uRg1Qez; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id a18-20020a170902b59200b00153e286ba0bsi2877722pls.520.2022.03.25.12.34.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 25 Mar 2022 12:34:25 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore-com.20210112.gappssmtp.com header.s=20210112 header.b=0uRg1Qez; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 828F6DBD20; Fri, 25 Mar 2022 11:25:12 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1359360AbiCYOqU (ORCPT + 99 others); Fri, 25 Mar 2022 10:46:20 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37914 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1359353AbiCYOqS (ORCPT ); Fri, 25 Mar 2022 10:46:18 -0400 Received: from mail-ej1-x636.google.com (mail-ej1-x636.google.com [IPv6:2a00:1450:4864:20::636]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 681506D194 for ; Fri, 25 Mar 2022 07:44:43 -0700 (PDT) Received: by mail-ej1-x636.google.com with SMTP id yy13so15846709ejb.2 for ; Fri, 25 Mar 2022 07:44:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=urG7wJTk7cfW0/ofN6lIZchUSJr5GfrgF/MGHRkbzfo=; b=0uRg1QezADBC/ILzIwNBoyspyE+c44iE0EV74wopWYwfcdaPLR0/iOlOqkaJD04K4m nJtf5lzxRfppUzB2TFGhB0T/LLpP1vPtgzoCPIboXORxHHDSaKop2nuyROd4PIkctcO3 zrMS7kndvdEf+wg4lAsQ6NzHWdnzbk+X5DHQWuqQV10/4hgymFy2xthTzcsf5ipTTyyF qQ+kG14vRSkBK9VzKb5mdIzU8SiwKFpWBGZD7Kucer6GHbbYWaCBxAnLwJBzph+eIWbF hYsvNoNP617PWdyyv5a3ucJlptVhA7PJ8Sz5nZ0t0e81jkgL0KH88AOd+u8xVbtNpb86 ry+A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=urG7wJTk7cfW0/ofN6lIZchUSJr5GfrgF/MGHRkbzfo=; b=1vZA0kP5x3QTgjYk75MrCg01oHAKAwwMmihRTNoucyE66fIGJt3B3tqwIf/pCe29NM VHHX6OBUUCoGS84Uth3yTp/AQKGQ13m92CMvc/RtJerQtab4NX3rEnmkRsNbjQATsgyP f+5jOcfRBqa/AS+MctyWQmv4yr+WzAoLp/KnY5JWarnQsfxudBy3HPjVQaP9xuwZ5lXv vlNaIwgHjNDX5J9kCVaFlzUpdr1RZZN3AxqJOoQmtq+ToNVfZviAj/AIgwjRDekZI2kh j5AxCTPZCzjbNIkV1edM/BOOYanffhHpziBZ019DZhh25L7fLLmKXq9p47PZPRdTM03e LyTA== X-Gm-Message-State: AOAM533qa+QDvA8/VZhY72KgNC56UdzM3Z2FUf0HzBzW6LC7WnIRtzOv Z40Oi3d6S+97c7H2B9z+lnj8y0DKVOQFTw9XLVra X-Received: by 2002:a17:907:7202:b0:6df:83a9:67d2 with SMTP id dr2-20020a170907720200b006df83a967d2mr11765091ejc.327.1648219481881; Fri, 25 Mar 2022 07:44:41 -0700 (PDT) MIME-Version: 1.0 References: <20211117015806.2192263-2-dvander@google.com> In-Reply-To: From: Paul Moore Date: Fri, 25 Mar 2022 10:44:31 -0400 Message-ID: Subject: Re: [PATCH v19 1/4] Add flags option to get xattr method paired to __vfs_getxattr To: Luca Weiss Cc: dvander@google.com, Luca.Boccassi@microsoft.com, darrick.wong@oracle.com, dsterba@suse.com, hubcap@omnibond.com, jack@suse.cz, jlayton@kernel.org, kernel-team@android.com, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, linux-unionfs@vger.kernel.org, paulmoore@microsoft.com, salyzyn@android.com, sds@tycho.nsa.gov, selinux@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 25, 2022 at 7:02 AM Luca Weiss wrote: > > Hi David, > > this patch doesn't compile with CONFIG_SECURITY=n: > > ./include/linux/security.h: In function 'security_inode_need_killpriv': > ./include/linux/security.h:893:40: error: passing argument 1 of 'cap_inode_need_killpriv' from incompatible pointer type [-Werror=incompatible-pointer-types] > 893 | return cap_inode_need_killpriv(dentry); > | ^~~~~~ > | | > | struct dentry * > ./include/linux/security.h:153:52: note: expected 'struct user_namespace *' but argument is of type 'struct dentry *' > 153 | int cap_inode_need_killpriv(struct user_namespace *mnt_userns, > | ~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~ > > I applied the patch on linux-next tag next-20220318, but the relevant part > doesn't seem to have changed lately. I believe David (and Google) have abandoned this patchset in favor of another approach. I'm possibly going to recycle some of the ideas in this patchset for some future work, but the details are still TBD. -- paul-moore.com