Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp13881ybx; Mon, 4 Nov 2019 15:00:56 -0800 (PST) X-Google-Smtp-Source: APXvYqy9ZbYTt6jOvnQI4TCM3DUgFpfgtn/7DvUpgGVm4Uu3Whl0eFtIkJpixD3Zm+Mk/OdiATRH X-Received: by 2002:a17:906:1395:: with SMTP id f21mr12906402ejc.152.1572908456343; Mon, 04 Nov 2019 15:00:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572908456; cv=none; d=google.com; s=arc-20160816; b=1JcMXaFc3w3ELSNF17cfo8va6fv26FsRM6niomhTJBZB1zpvqHPPIMWlDGLmt2w2Jf BXYm+hzQ+5todJpsKeqfwh9VOl9tHRs14tnb4ZByVvKdJWXQRaJA4VLirIVRo2jJ2hJ/ XyWzs/PIKBzvRnMKEhGQAnyQQ+VgT5vBTuvH3ZMDh8ygWqMDEgolbcZG6RUOnbLFFhgZ 8KQ+uhV1d9Qouv5GsgoE0LyMbwURRQ07vl2u6DbeR8/McGtgheMPqp0Njzkt7/8wn6jX bdwjsmUupEystFq/sbnYS/Chs9S0NotNmnBl/3RidDSEWQ0n/NuBSG+NaXli6TeOKg7g EkfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=ZoNtm+oK6bNUFDmkKzOg4FObju1Qo0KbOMfi+GyRdOc=; b=KYuYccgFb/zhu/v6e216G802ah/mygPVF2E7wGEJcRXHJTOC/HwmzDH5tVy1KJC/6c vs3nh311IBEqOA/FC+0NvxcQbBP9Plf0miFw7MvA+Hss4KoDycCuImgHgv7E/ugNynCI /P6T26lyD4C3R40FUbq59msWLZJnx3XSVcyKxTBYN3P1yjTLlyopRT/fD07q1d9nJqtV 44MWtQzSXLz/2iJmEutmhoGOCPdUggxhF8pDY7DNQbrpRs0aknTdqP4TtQ/h6AuDBwK4 AxvjmKbU6GXvdyJXUM0gq8XHV7JNINA4hSOxEKBcjnJLydPgdQ2mh69BuQl1X4t8gPnp 1GtQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z35si8468525edz.260.2019.11.04.15.00.22; Mon, 04 Nov 2019 15:00:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729810AbfKDW6r (ORCPT + 99 others); Mon, 4 Nov 2019 17:58:47 -0500 Received: from fieldses.org ([173.255.197.46]:60204 "EHLO fieldses.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729122AbfKDW6q (ORCPT ); Mon, 4 Nov 2019 17:58:46 -0500 Received: by fieldses.org (Postfix, from userid 2815) id 36CE5ABE; Mon, 4 Nov 2019 17:58:46 -0500 (EST) Date: Mon, 4 Nov 2019 17:58:46 -0500 From: Bruce Fields To: Frank van der Linden Cc: Chuck Lever , Linux NFS Mailing List , linux-fsdevel Subject: Re: [RFC PATCH 00/35] user xattr support (RFC8276) Message-ID: <20191104225846.GA13469@fieldses.org> References: <9CAEB69A-A92C-47D8-9871-BA6EA83E1881@gmail.com> <20191024231547.GA16466@dev-dsk-fllinden-2c-c1893d73.us-west-2.amazon.com> <18D2845F-27FF-4EDF-AB8A-E6051FA03DF0@gmail.com> <20191104030132.GD26578@fieldses.org> <358420D8-596E-4D3B-A01C-DACB101F0017@gmail.com> <20191104162147.GA31399@dev-dsk-fllinden-2c-c1893d73.us-west-2.amazon.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191104162147.GA31399@dev-dsk-fllinden-2c-c1893d73.us-west-2.amazon.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Mon, Nov 04, 2019 at 04:21:47PM +0000, Frank van der Linden wrote: > On Mon, Nov 04, 2019 at 10:36:03AM -0500, Chuck Lever wrote: > > > > Following the server's local file systems' mount options seems like a > > good way to go. In particular, is there a need to expose user xattrs > > on the server host, but prevent NFS clients' access to them? I can't > > think of one. > > Ok, that sounds fine to me - I'll remove the user_xattr export flag, > and we had already agreed to do away with the CONFIGs. > > That leaves one last item with regard to enabling support: the client side > mount option. I assume the [no]user_xattr option should work the same as > with other filesystems. What about the default setting? Just checking code for other filesystems quickly; if I understand right: - ext4 has user_xattr and nouser_xattr options, but you get a deprecation warning if you try to use the latter; - xfs doesn't support either option; - cifs supports both, with xattr support the default. Not necessarily my call, but just for simplicity's sake, I'd probably leave out the option and see if anybody complains. > Also, currently, my code does not fail the mount operation if user xattrs > are asked for, but the server does not support them. It just doesn't > set NFS_CAP_XATTR for the server, and the xattr handler entry points > eturn -EOPNOTSUPP, as they check for NFS_CAP_XATTR. What's the preferred > behavior there? getxattr(2) under ERRORS says: ENOTSUP Extended attributes are not supported by the filesystem, or are disabled. so I'm guessing just erroring out is clearest. I also see there's an EOPNOTSUPP return in the nouser_xattr case in ext4_xattr_user_get. (errno(3) says ENOTSUP and EOPNOTSUPP are the same value on Linux.) --b.