On Wed, Jan 03, 2024 at 04:22:29PM +0900, Dominique Martinet wrote: > David Howells wrote on Thu, Dec 21, 2023 at 01:23:35PM +0000: > > I've noticed we don't cache xattrs are all, so with the default mount > options on a kernel built with 9P_FS_SECURITY we'll get a gazillion > lookups for security.capabilities... But that's another problem, and > this is still an improvement so no reason to hold back. > This is a big problem and already on my backlog list since some things default to this even if the remote file system doesn't support xattrs. The quick fix is to disable on a mount when we detect the host side isn't supporting them (of course this could be weird for exports that cross file system boundries) -- at the very least we could keep this info on an inode basis and not request as long as the inode info is cached. Caching the actual properties is also a step, but given this is a security feature, I imagine we don't want to trust our cache and will always have to ask server unless we can come up with something clever to indicate xattr changes (haven't looked into that much yet). > > (I'd still be extremly thanksful if Christian and/or Eric would have > time to check as well, but I won't push back to merging it this merge > window next week if they don't have time... I'll also keep trying to run > some more tests as time allows) > I'll try to run through my regression tests as well, but sure we can fix things up after the merge window if we miss things. -eric