* Re: [PATCH] fix NFSv4 acl detection on F39 [not found] ` <TYXPR01MB18547A591663A4934B5D4D82D9789@TYXPR01MB1854.jpnprd01.prod.outlook.com> @ 2023-05-15 17:11 ` Jeff Layton 2023-05-15 17:28 ` Trond Myklebust 0 siblings, 1 reply; 7+ messages in thread From: Jeff Layton @ 2023-05-15 17:11 UTC (permalink / raw) To: Ondrej Valousek, Paul Eggert, Bruno Haible, Christian Brauner Cc: bug-gnulib@gnu.org, linux-fsdevel, linux-nfs On Mon, 2023-05-15 at 11:50 +0000, Ondrej Valousek wrote: > Hi Paul, > > Ok first of all, thanks for taking initiative on this, I am unable to proceed on this on my own at the moment. > I see few problems with this: > > 1. The calculation of the 'listbufsize' is incorrect in your patch. It will _not_work as you expected and won't limit the number of syscalls (which is why we came up with this patch, right?). Check with my original proposal, we really need to check for 'system.nfs4' xattr name presence here > 2. It mistakenly detects an ACL presence on files which do not have any ACL on NFSv4 filesystem. Digging further it seems that kernel in F39 behaves differently to the previous kernels: > > F38: > # getfattr -m . /path_to_nfs4_file > # file: path_to_nfs4_file > system.nfs4_acl <---- only single xattr detected > > F39: > # getfattr -m . /path_to_nfs4_file > # file: path_to_nfs4_file > system.nfs4_acl > system.posix_acl_default > /* SOMETIMES even shows this */ > system.posix_acl_default (cc'ing Christian and relevant kernel lists) I assume the F39 kernel is v6.4-rc based? If so, then I think that's a regression. NFSv4 client inodes should _not_ report a POSIX ACL attribute since the protocol doesn't support them. In fact, I think the rationale in the kernel commit below is wrong. NFSv4 has a listxattr operation, but doesn't support POSIX ACLs. Christian, do we need to revert this? commit e499214ce3ef50c50522719e753a1ffc928c2ec1 Author: Christian Brauner <brauner@kernel.org> Date: Wed Feb 1 14:15:01 2023 +0100 acl: don't depend on IOP_XATTR All codepaths that don't want to implement POSIX ACLs should simply not implement the associated inode operations instead of relying on IOP_XATTR. That's the case for all filesystems today. For vfs_listxattr() all filesystems that explicitly turn of xattrs for a given inode all set inode->i_op to a dedicated set of inode operations that doesn't implement ->listxattr(). We can remove the dependency of vfs_listxattr() on IOP_XATTR. Removing this dependency will allow us to decouple POSIX ACLs from IOP_XATTR and they can still be listed even if no other xattr handlers are implemented. Otherwise we would have to implement elaborate schemes to raise IOP_XATTR even if sb->s_xattr is set to NULL. Signed-off-by: Christian Brauner (Microsoft) <brauner@kernel.org> > > Now I faintly recall there was an activity in to move POSIX acls calculation from userspace to kernel (now Jeff in CC will hopefully clarify this) > The POSIX<->NFSv4 ACL translation has always been in the kernel server. It has to be, as the primary purpose is to translate v4 ACLs from the clients to and from the POSIX ACLs that the exported Linux filesystems support. -- Jeff Layton <jlayton@redhat.com> ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] fix NFSv4 acl detection on F39 2023-05-15 17:11 ` [PATCH] fix NFSv4 acl detection on F39 Jeff Layton @ 2023-05-15 17:28 ` Trond Myklebust 2023-05-15 17:49 ` Jeff Layton 0 siblings, 1 reply; 7+ messages in thread From: Trond Myklebust @ 2023-05-15 17:28 UTC (permalink / raw) To: eggert@cs.ucla.edu, jlayton@redhat.com, bruno@clisp.org, ondrej.valousek.xm@renesas.com, brauner@kernel.org Cc: bug-gnulib@gnu.org, linux-fsdevel@vger.kernel.org, linux-nfs@vger.kernel.org On Mon, 2023-05-15 at 13:11 -0400, Jeff Layton wrote: > On Mon, 2023-05-15 at 11:50 +0000, Ondrej Valousek wrote: > > Hi Paul, > > > > Ok first of all, thanks for taking initiative on this, I am unable > > to proceed on this on my own at the moment. > > I see few problems with this: > > > > 1. The calculation of the 'listbufsize' is incorrect in your patch. > > It will _not_work as you expected and won't limit the number of > > syscalls (which is why we came up with this patch, right?). Check > > with my original proposal, we really need to check for > > 'system.nfs4' xattr name presence here > > 2. It mistakenly detects an ACL presence on files which do not have > > any ACL on NFSv4 filesystem. Digging further it seems that kernel > > in F39 behaves differently to the previous kernels: > > > > F38: > > # getfattr -m . /path_to_nfs4_file > > # file: path_to_nfs4_file > > system.nfs4_acl <---- only > > single xattr detected > > > > F39: > > # getfattr -m . /path_to_nfs4_file > > # file: path_to_nfs4_file > > system.nfs4_acl > > system.posix_acl_default > > /* SOMETIMES even shows this */ > > system.posix_acl_default > > (cc'ing Christian and relevant kernel lists) > > I assume the F39 kernel is v6.4-rc based? If so, then I think that's > a > regression. NFSv4 client inodes should _not_ report a POSIX ACL > attribute since the protocol doesn't support them. > > In fact, I think the rationale in the kernel commit below is wrong. > NFSv4 has a listxattr operation, but doesn't support POSIX ACLs. > > Christian, do we need to revert this? > > commit e499214ce3ef50c50522719e753a1ffc928c2ec1 > Author: Christian Brauner <brauner@kernel.org> > Date: Wed Feb 1 14:15:01 2023 +0100 > > acl: don't depend on IOP_XATTR > > No. The problem is commit f2620f166e2a ("xattr: simplify listxattr helpers") which helpfully inserts posix acl handlers into generic_listxattr(), and makes it impossible to call from nfs4_listxattr(). -- Trond Myklebust Linux NFS client maintainer, Hammerspace trond.myklebust@hammerspace.com ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] fix NFSv4 acl detection on F39 2023-05-15 17:28 ` Trond Myklebust @ 2023-05-15 17:49 ` Jeff Layton 2023-05-15 18:53 ` Trond Myklebust 2023-05-16 9:17 ` Christian Brauner 0 siblings, 2 replies; 7+ messages in thread From: Jeff Layton @ 2023-05-15 17:49 UTC (permalink / raw) To: Trond Myklebust, eggert@cs.ucla.edu, bruno@clisp.org, ondrej.valousek.xm@renesas.com, brauner@kernel.org Cc: bug-gnulib@gnu.org, linux-fsdevel@vger.kernel.org, linux-nfs@vger.kernel.org On Mon, 2023-05-15 at 17:28 +0000, Trond Myklebust wrote: > On Mon, 2023-05-15 at 13:11 -0400, Jeff Layton wrote: > > On Mon, 2023-05-15 at 11:50 +0000, Ondrej Valousek wrote: > > > Hi Paul, > > > > > > Ok first of all, thanks for taking initiative on this, I am unable > > > to proceed on this on my own at the moment. > > > I see few problems with this: > > > > > > 1. The calculation of the 'listbufsize' is incorrect in your patch. > > > It will _not_work as you expected and won't limit the number of > > > syscalls (which is why we came up with this patch, right?). Check > > > with my original proposal, we really need to check for > > > 'system.nfs4' xattr name presence here > > > 2. It mistakenly detects an ACL presence on files which do not have > > > any ACL on NFSv4 filesystem. Digging further it seems that kernel > > > in F39 behaves differently to the previous kernels: > > > > > > F38: > > > # getfattr -m . /path_to_nfs4_file > > > # file: path_to_nfs4_file > > > system.nfs4_acl <---- only > > > single xattr detected > > > > > > F39: > > > # getfattr -m . /path_to_nfs4_file > > > # file: path_to_nfs4_file > > > system.nfs4_acl > > > system.posix_acl_default > > > /* SOMETIMES even shows this */ > > > system.posix_acl_default > > > > (cc'ing Christian and relevant kernel lists) > > > > I assume the F39 kernel is v6.4-rc based? If so, then I think that's > > a > > regression. NFSv4 client inodes should _not_ report a POSIX ACL > > attribute since the protocol doesn't support them. > > > > In fact, I think the rationale in the kernel commit below is wrong. > > NFSv4 has a listxattr operation, but doesn't support POSIX ACLs. > > > > Christian, do we need to revert this? > > > > commit e499214ce3ef50c50522719e753a1ffc928c2ec1 > > Author: Christian Brauner <brauner@kernel.org> > > Date: Wed Feb 1 14:15:01 2023 +0100 > > > > acl: don't depend on IOP_XATTR > > > > > > > No. The problem is commit f2620f166e2a ("xattr: simplify listxattr > helpers") which helpfully inserts posix acl handlers into > generic_listxattr(), and makes it impossible to call from > nfs4_listxattr(). > Ahh ok. Looking at that function though, it seems like it'd only report these for mounts that set SB_POSIXACL. Any reason that we have that turned on with v4 mounts? This patch fixes the bug for me, but I haven't done any testing with it: ---------------8<----------------- [RFC PATCH] nfs: don't set SB_POSIXACL on NFSv4 mounts Signed-off-by: Jeff Layton <jlayton@kernel.org> --- fs/nfs/super.c | 1 - 1 file changed, 1 deletion(-) diff --git a/fs/nfs/super.c b/fs/nfs/super.c index 30e53e93049e..cbb8de6e25dc 100644 --- a/fs/nfs/super.c +++ b/fs/nfs/super.c @@ -1057,7 +1057,6 @@ static void nfs_fill_super(struct super_block *sb, struct nfs_fs_context *ctx) sb->s_export_op = &nfs_export_ops; break; case 4: - sb->s_flags |= SB_POSIXACL; sb->s_time_gran = 1; sb->s_time_min = S64_MIN; sb->s_time_max = S64_MAX; -- 2.40.1 ^ permalink raw reply related [flat|nested] 7+ messages in thread
* Re: [PATCH] fix NFSv4 acl detection on F39 2023-05-15 17:49 ` Jeff Layton @ 2023-05-15 18:53 ` Trond Myklebust 2023-05-16 9:17 ` Christian Brauner 1 sibling, 0 replies; 7+ messages in thread From: Trond Myklebust @ 2023-05-15 18:53 UTC (permalink / raw) To: eggert@cs.ucla.edu, jlayton@redhat.com, bruno@clisp.org, ondrej.valousek.xm@renesas.com, brauner@kernel.org Cc: bug-gnulib@gnu.org, linux-fsdevel@vger.kernel.org, linux-nfs@vger.kernel.org On Mon, 2023-05-15 at 13:49 -0400, Jeff Layton wrote: > On Mon, 2023-05-15 at 17:28 +0000, Trond Myklebust wrote: > > On Mon, 2023-05-15 at 13:11 -0400, Jeff Layton wrote: > > > On Mon, 2023-05-15 at 11:50 +0000, Ondrej Valousek wrote: > > > > Hi Paul, > > > > > > > > Ok first of all, thanks for taking initiative on this, I am > > > > unable > > > > to proceed on this on my own at the moment. > > > > I see few problems with this: > > > > > > > > 1. The calculation of the 'listbufsize' is incorrect in your > > > > patch. > > > > It will _not_work as you expected and won't limit the number of > > > > syscalls (which is why we came up with this patch, right?). > > > > Check > > > > with my original proposal, we really need to check for > > > > 'system.nfs4' xattr name presence here > > > > 2. It mistakenly detects an ACL presence on files which do not > > > > have > > > > any ACL on NFSv4 filesystem. Digging further it seems that > > > > kernel > > > > in F39 behaves differently to the previous kernels: > > > > > > > > F38: > > > > # getfattr -m . /path_to_nfs4_file > > > > # file: path_to_nfs4_file > > > > system.nfs4_acl <---- only > > > > single xattr detected > > > > > > > > F39: > > > > # getfattr -m . /path_to_nfs4_file > > > > # file: path_to_nfs4_file > > > > system.nfs4_acl > > > > system.posix_acl_default > > > > /* SOMETIMES even shows this */ > > > > system.posix_acl_default > > > > > > (cc'ing Christian and relevant kernel lists) > > > > > > I assume the F39 kernel is v6.4-rc based? If so, then I think > > > that's > > > a > > > regression. NFSv4 client inodes should _not_ report a POSIX ACL > > > attribute since the protocol doesn't support them. > > > > > > In fact, I think the rationale in the kernel commit below is > > > wrong. > > > NFSv4 has a listxattr operation, but doesn't support POSIX ACLs. > > > > > > Christian, do we need to revert this? > > > > > > commit e499214ce3ef50c50522719e753a1ffc928c2ec1 > > > Author: Christian Brauner <brauner@kernel.org> > > > Date: Wed Feb 1 14:15:01 2023 +0100 > > > > > > acl: don't depend on IOP_XATTR > > > > > > > > > > > > No. The problem is commit f2620f166e2a ("xattr: simplify listxattr > > helpers") which helpfully inserts posix acl handlers into > > generic_listxattr(), and makes it impossible to call from > > nfs4_listxattr(). > > > > > Ahh ok. Looking at that function though, it seems like it'd only > report > these for mounts that set SB_POSIXACL. Any reason that we have that > turned on with v4 mounts? > So, while it may seem reasonable to assume that SB_POSIXACL means 'supports posix ACLs', that doesn't actually match the definition in include/linux/fs.h (or the equivalent definition for MS_POSIXACL): #define SB_POSIXACL (1<<16) /* VFS does not apply the umask */ See the use of mode_strip_umask() in vfs_prepare_mode(). So yes, NFSv4 sets SB_POSIXACL, and it has done so since commit a8a5da996df7 ("nfs: Set MS_POSIXACL always") because we require the VFS to not apply the umask. -- Trond Myklebust Linux NFS client maintainer, Hammerspace trond.myklebust@hammerspace.com ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] fix NFSv4 acl detection on F39 2023-05-15 17:49 ` Jeff Layton 2023-05-15 18:53 ` Trond Myklebust @ 2023-05-16 9:17 ` Christian Brauner 2023-05-16 12:20 ` Jeff Layton 1 sibling, 1 reply; 7+ messages in thread From: Christian Brauner @ 2023-05-16 9:17 UTC (permalink / raw) To: Jeff Layton Cc: Trond Myklebust, eggert@cs.ucla.edu, bruno@clisp.org, ondrej.valousek.xm@renesas.com, bug-gnulib@gnu.org, linux-fsdevel@vger.kernel.org, linux-nfs@vger.kernel.org On Mon, May 15, 2023 at 01:49:21PM -0400, Jeff Layton wrote: > On Mon, 2023-05-15 at 17:28 +0000, Trond Myklebust wrote: > > On Mon, 2023-05-15 at 13:11 -0400, Jeff Layton wrote: > > > On Mon, 2023-05-15 at 11:50 +0000, Ondrej Valousek wrote: > > > > Hi Paul, > > > > > > > > Ok first of all, thanks for taking initiative on this, I am unable > > > > to proceed on this on my own at the moment. > > > > I see few problems with this: > > > > > > > > 1. The calculation of the 'listbufsize' is incorrect in your patch. > > > > It will _not_work as you expected and won't limit the number of > > > > syscalls (which is why we came up with this patch, right?). Check > > > > with my original proposal, we really need to check for > > > > 'system.nfs4' xattr name presence here > > > > 2. It mistakenly detects an ACL presence on files which do not have > > > > any ACL on NFSv4 filesystem. Digging further it seems that kernel > > > > in F39 behaves differently to the previous kernels: > > > > > > > > F38: > > > > # getfattr -m . /path_to_nfs4_file > > > > # file: path_to_nfs4_file > > > > system.nfs4_acl <---- only > > > > single xattr detected > > > > > > > > F39: > > > > # getfattr -m . /path_to_nfs4_file > > > > # file: path_to_nfs4_file > > > > system.nfs4_acl > > > > system.posix_acl_default > > > > /* SOMETIMES even shows this */ > > > > system.posix_acl_default > > > > > > (cc'ing Christian and relevant kernel lists) > > > > > > I assume the F39 kernel is v6.4-rc based? If so, then I think that's > > > a > > > regression. NFSv4 client inodes should _not_ report a POSIX ACL > > > attribute since the protocol doesn't support them. > > > > > > In fact, I think the rationale in the kernel commit below is wrong. > > > NFSv4 has a listxattr operation, but doesn't support POSIX ACLs. > > > > > > Christian, do we need to revert this? > > > > > > commit e499214ce3ef50c50522719e753a1ffc928c2ec1 > > > Author: Christian Brauner <brauner@kernel.org> > > > Date: Wed Feb 1 14:15:01 2023 +0100 > > > > > > acl: don't depend on IOP_XATTR > > > > > > > > > > > > No. The problem is commit f2620f166e2a ("xattr: simplify listxattr > > helpers") which helpfully inserts posix acl handlers into > > generic_listxattr(), and makes it impossible to call from > > nfs4_listxattr(). > > > > > Ahh ok. Looking at that function though, it seems like it'd only report > these for mounts that set SB_POSIXACL. Any reason that we have that > turned on with v4 mounts? You seem to just be calling generic_listxattr() in fs/nfs/nfs4proc.c and not using it as an inode operation. So imho just add a tiny helper into fs/xattr.c that takes a boolean argument and skips over POSIX ACLs that you can call in nfs4. That should be enough, no? ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] fix NFSv4 acl detection on F39 2023-05-16 9:17 ` Christian Brauner @ 2023-05-16 12:20 ` Jeff Layton 2023-05-16 12:29 ` Christian Brauner 0 siblings, 1 reply; 7+ messages in thread From: Jeff Layton @ 2023-05-16 12:20 UTC (permalink / raw) To: Christian Brauner Cc: Trond Myklebust, eggert@cs.ucla.edu, bruno@clisp.org, ondrej.valousek.xm@renesas.com, bug-gnulib@gnu.org, linux-fsdevel@vger.kernel.org, linux-nfs@vger.kernel.org On Tue, 2023-05-16 at 11:17 +0200, Christian Brauner wrote: > On Mon, May 15, 2023 at 01:49:21PM -0400, Jeff Layton wrote: > > On Mon, 2023-05-15 at 17:28 +0000, Trond Myklebust wrote: > > > On Mon, 2023-05-15 at 13:11 -0400, Jeff Layton wrote: > > > > On Mon, 2023-05-15 at 11:50 +0000, Ondrej Valousek wrote: > > > > > Hi Paul, > > > > > > > > > > Ok first of all, thanks for taking initiative on this, I am unable > > > > > to proceed on this on my own at the moment. > > > > > I see few problems with this: > > > > > > > > > > 1. The calculation of the 'listbufsize' is incorrect in your patch. > > > > > It will _not_work as you expected and won't limit the number of > > > > > syscalls (which is why we came up with this patch, right?). Check > > > > > with my original proposal, we really need to check for > > > > > 'system.nfs4' xattr name presence here > > > > > 2. It mistakenly detects an ACL presence on files which do not have > > > > > any ACL on NFSv4 filesystem. Digging further it seems that kernel > > > > > in F39 behaves differently to the previous kernels: > > > > > > > > > > F38: > > > > > # getfattr -m . /path_to_nfs4_file > > > > > # file: path_to_nfs4_file > > > > > system.nfs4_acl <---- only > > > > > single xattr detected > > > > > > > > > > F39: > > > > > # getfattr -m . /path_to_nfs4_file > > > > > # file: path_to_nfs4_file > > > > > system.nfs4_acl > > > > > system.posix_acl_default > > > > > /* SOMETIMES even shows this */ > > > > > system.posix_acl_default > > > > > > > > (cc'ing Christian and relevant kernel lists) > > > > > > > > I assume the F39 kernel is v6.4-rc based? If so, then I think that's > > > > a > > > > regression. NFSv4 client inodes should _not_ report a POSIX ACL > > > > attribute since the protocol doesn't support them. > > > > > > > > In fact, I think the rationale in the kernel commit below is wrong. > > > > NFSv4 has a listxattr operation, but doesn't support POSIX ACLs. > > > > > > > > Christian, do we need to revert this? > > > > > > > > commit e499214ce3ef50c50522719e753a1ffc928c2ec1 > > > > Author: Christian Brauner <brauner@kernel.org> > > > > Date: Wed Feb 1 14:15:01 2023 +0100 > > > > > > > > acl: don't depend on IOP_XATTR > > > > > > > > > > > > > > > > > No. The problem is commit f2620f166e2a ("xattr: simplify listxattr > > > helpers") which helpfully inserts posix acl handlers into > > > generic_listxattr(), and makes it impossible to call from > > > nfs4_listxattr(). > > > > > > > > > Ahh ok. Looking at that function though, it seems like it'd only report > > these for mounts that set SB_POSIXACL. Any reason that we have that > > turned on with v4 mounts? > > You seem to just be calling generic_listxattr() in fs/nfs/nfs4proc.c and > not using it as an inode operation. > Correct, but even if we were, this would be doing the wrong thing. As Trond pointed out, f2620f166e2a changed the behavior of generic_listxattr to make it include the POSIX ACL entries. > So imho just add a tiny helper into > fs/xattr.c that takes a boolean argument and skips over POSIX ACLs that > you can call in nfs4. That should be enough, no? > The only other user of generic_listxattr is HFS, and I don't think it supports POSIX ACLs either. I think we should probably just remove the call to posix_acl_listxattr from generic_listxattr. -- Jeff Layton <jlayton@redhat.com> ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] fix NFSv4 acl detection on F39 2023-05-16 12:20 ` Jeff Layton @ 2023-05-16 12:29 ` Christian Brauner 0 siblings, 0 replies; 7+ messages in thread From: Christian Brauner @ 2023-05-16 12:29 UTC (permalink / raw) To: Jeff Layton Cc: Trond Myklebust, eggert@cs.ucla.edu, bruno@clisp.org, ondrej.valousek.xm@renesas.com, bug-gnulib@gnu.org, linux-fsdevel@vger.kernel.org, linux-nfs@vger.kernel.org On Tue, May 16, 2023 at 08:20:33AM -0400, Jeff Layton wrote: > On Tue, 2023-05-16 at 11:17 +0200, Christian Brauner wrote: > > On Mon, May 15, 2023 at 01:49:21PM -0400, Jeff Layton wrote: > > > On Mon, 2023-05-15 at 17:28 +0000, Trond Myklebust wrote: > > > > On Mon, 2023-05-15 at 13:11 -0400, Jeff Layton wrote: > > > > > On Mon, 2023-05-15 at 11:50 +0000, Ondrej Valousek wrote: > > > > > > Hi Paul, > > > > > > > > > > > > Ok first of all, thanks for taking initiative on this, I am unable > > > > > > to proceed on this on my own at the moment. > > > > > > I see few problems with this: > > > > > > > > > > > > 1. The calculation of the 'listbufsize' is incorrect in your patch. > > > > > > It will _not_work as you expected and won't limit the number of > > > > > > syscalls (which is why we came up with this patch, right?). Check > > > > > > with my original proposal, we really need to check for > > > > > > 'system.nfs4' xattr name presence here > > > > > > 2. It mistakenly detects an ACL presence on files which do not have > > > > > > any ACL on NFSv4 filesystem. Digging further it seems that kernel > > > > > > in F39 behaves differently to the previous kernels: > > > > > > > > > > > > F38: > > > > > > # getfattr -m . /path_to_nfs4_file > > > > > > # file: path_to_nfs4_file > > > > > > system.nfs4_acl <---- only > > > > > > single xattr detected > > > > > > > > > > > > F39: > > > > > > # getfattr -m . /path_to_nfs4_file > > > > > > # file: path_to_nfs4_file > > > > > > system.nfs4_acl > > > > > > system.posix_acl_default > > > > > > /* SOMETIMES even shows this */ > > > > > > system.posix_acl_default > > > > > > > > > > (cc'ing Christian and relevant kernel lists) > > > > > > > > > > I assume the F39 kernel is v6.4-rc based? If so, then I think that's > > > > > a > > > > > regression. NFSv4 client inodes should _not_ report a POSIX ACL > > > > > attribute since the protocol doesn't support them. > > > > > > > > > > In fact, I think the rationale in the kernel commit below is wrong. > > > > > NFSv4 has a listxattr operation, but doesn't support POSIX ACLs. > > > > > > > > > > Christian, do we need to revert this? > > > > > > > > > > commit e499214ce3ef50c50522719e753a1ffc928c2ec1 > > > > > Author: Christian Brauner <brauner@kernel.org> > > > > > Date: Wed Feb 1 14:15:01 2023 +0100 > > > > > > > > > > acl: don't depend on IOP_XATTR > > > > > > > > > > > > > > > > > > > > > > No. The problem is commit f2620f166e2a ("xattr: simplify listxattr > > > > helpers") which helpfully inserts posix acl handlers into > > > > generic_listxattr(), and makes it impossible to call from > > > > nfs4_listxattr(). > > > > > > > > > > > > > Ahh ok. Looking at that function though, it seems like it'd only report > > > these for mounts that set SB_POSIXACL. Any reason that we have that > > > turned on with v4 mounts? > > > > You seem to just be calling generic_listxattr() in fs/nfs/nfs4proc.c and > > not using it as an inode operation. > > > > Correct, but even if we were, this would be doing the wrong thing. As > Trond pointed out, f2620f166e2a changed the behavior of > generic_listxattr to make it include the POSIX ACL entries. > > > So imho just add a tiny helper into > > fs/xattr.c that takes a boolean argument and skips over POSIX ACLs that > > you can call in nfs4. That should be enough, no? > > > > The only other user of generic_listxattr is HFS, and I don't think it > supports POSIX ACLs either. I think we should probably just remove the > call to posix_acl_listxattr from generic_listxattr. Ok, I see. Thanks for spotting this. The reason POSIX ACLs were moved into generic_listxattr() was because they would've been included before too. If any filesystem would have registered sb->s_xattr handlers for POSIX ACLs they would've been included in generic_listxattr(). Can you send a patch to me so I can route it to Linus? Please add a comment that this function doesn't return POSIX ACLs. ^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2023-05-16 12:29 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <20230501194321.57983-1-ondrej.valousek.xm@renesas.com>
[not found] ` <c955ee20-371c-5dde-fcb5-26d573f69cd9@cs.ucla.edu>
[not found] ` <TYXPR01MB1854B3C3B8215DD0FA7B83CCD96D9@TYXPR01MB1854.jpnprd01.prod.outlook.com>
[not found] ` <17355394.lhrHg4fidi@nimes>
[not found] ` <32edbaf1-d3b1-6057-aefc-d83df3266c20@cs.ucla.edu>
[not found] ` <4f1519d8-bda1-1b15-4a78-a8072ba1551a@cs.ucla.edu>
[not found] ` <TYXPR01MB18547A591663A4934B5D4D82D9789@TYXPR01MB1854.jpnprd01.prod.outlook.com>
2023-05-15 17:11 ` [PATCH] fix NFSv4 acl detection on F39 Jeff Layton
2023-05-15 17:28 ` Trond Myklebust
2023-05-15 17:49 ` Jeff Layton
2023-05-15 18:53 ` Trond Myklebust
2023-05-16 9:17 ` Christian Brauner
2023-05-16 12:20 ` Jeff Layton
2023-05-16 12:29 ` Christian Brauner
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).