On Thu, Oct 26, 2017 at 05:11:18PM -0700, Darrick J. Wong wrote: > On Thu, Oct 26, 2017 at 06:48:53PM -0500, Eric Sandeen wrote: > > > b) xfsctl() > > Requires an open file descriptor, path argument not used. Returns EBADF if > you opened a symlink with O_PATH|O_NOFOLLOW, which AFAIK is the only way to > do that. Hrm, were you suggesting you didn't think its possible to use xfsctl to set some attributes? Because I was able to: #include <xfs/xfs.h> #include <stdlib.h> #include <string.h> #include <sys/stat.h> #include <fcntl.h> char *prog; static void usage(void) { printf("Usage: %s [set|get] <file>\n", prog); exit(1); } int main(int argc, char *argv[]) { int ret = 0; struct stat sb; char *cmd_str, *file; int cmd = 0; int open_flags = 0; int fd; struct fsxattr fsx; prog = argv[0]; if (argc != 3) usage(); memset(&fsx, 0, sizeof(fsx)); /* First run is get to get old values */ cmd = FS_IOC_FSGETXATTR; if ((strncmp("get", argv[1], 3) == 0)) open_flags = O_RDONLY; else if (strncmp("set", argv[1], 3) == 0) { cmd = FS_IOC_FSGETXATTR; open_flags = O_RDWR | O_APPEND; } if (!open_flags) usage(); cmd_str = argv[1]; ret = stat(argv[2], &sb); if (ret) { printf("File may not be present or readable\n"); usage(); } file = argv[2]; fd = open(file, open_flags); if (!fd) { printf("Could not open file for operation: %s\n", cmd_str); usage(); } ret = xfsctl(file, fd, cmd, &fsx); if (ret < 0) { printf("Could not issue xfsctl GET flags\n"); exit(1); } if (strncmp("get", argv[1], 3) == 0) goto out; /* Now do the setting */ cmd = FS_IOC_FSSETXATTR; fsx.fsx_xflags |= XFS_XFLAG_APPEND; ret = xfsctl(file, fd, cmd, &fsx); if (ret < 0) { printf("Could not issue xfsctl SET flags\n"); exit(1); } out: printf("fsxattr.xflags = 0x%x\n", fsx.fsx_xflags); return 0; } However, its unclear if we intentionally supported this. > > > c) xfs_db [1] [2] - only when umounted > > Fuzzing and corruption aren't all that dissimilar. :) Agreed. > > > POSIX doesn't seem to actually have a position on this. > > > > > > These are not extended attributes, however xattr(7) does have > > > a little nugget worth considering regarding this, and for which > > > it was decided to at least not support extended attributes on > > > symlinks or special files: > > > > > > The file permissions of symbolic links are not used in > > > access checks. These differences would allow users to consume > > > filesystem resources in a way not controllable by disk quotas > > > for group or world writable special files and directories. > > > > > > For this reason, extended user attributes are allowed only for > > > regular files and directories. > > Yet lsetxattr() sets extended attributes on a symlink, right? True... > > Hm, that seems like a different issue/rationale, no? > > > > > For these reasons, and since corruption is the only current valid > > > case where these seem to have popped up -- apply the same logic on > > > XFS, otherwise we'd be going against the e2fsprogs chattr convention > > > set since August 2002, and which folks likely are used to. > > > > > > This fixes filesystems which have these attributes set where clearly > > > they were set by corruption. > > > > OK but hang on, I think a core question is: > > > > Does the kernel allow us to set attributes on symlinks? > > I don't think it should, I can't figure out how userspace would set them > in the first place, It seems we currently allow for it though :( Perhaps another consideration to take, but I didn't test, should attributes set with SETFLAGS be preserved across filesystems? If so this may be an issue. > but repair (and now scrub) don't actually check those flags. Right, given we seem to be rather loose on SETFLAGS, its unclear really what is the right thing to do should be. > > > diff --git a/repair/dinode.c b/repair/dinode.c > > > index 15ba8cc22b39..03e93a6e17c0 100644 > > > --- a/repair/dinode.c > > > +++ b/repair/dinode.c > > > @@ -2482,6 +2482,41 @@ _("bad (negative) size %" PRId64 " on inode %" PRIu64 "\n"), > > > FS_XFLAG_EXTSIZE); > > > } > > > } > > > + if (flags & (XFS_DIFLAG_REALTIME | XFS_DIFLAG_PREALLOC | > > > + XFS_DIFLAG_IMMUTABLE | XFS_DIFLAG_APPEND | > > > + XFS_DIFLAG_SYNC | XFS_DIFLAG_NOATIME | > > > + XFS_DIFLAG_NODUMP | XFS_DIFLAG_RTINHERIT | > > > + XFS_DIFLAG_PROJINHERIT | XFS_DIFLAG_NOSYMLINKS | > > > + XFS_DIFLAG_EXTSIZE | XFS_DIFLAG_EXTSZINHERIT | > > > + XFS_DIFLAG_NODEFRAG | XFS_DIFLAG_FILESTREAM | > > > + XFS_DIFLAG2_DAX | XFS_DIFLAG2_COWEXTSIZE)) { > > Do not mix DIFLAG and DIFLAG2. > > Also probably easier on the eyes if you don't write this huge OR list > twice. Great, I thought it wasn't done before due to some reason, but that is indeed the approach I prefer. Luis -- To unsubscribe from this list: send the line "unsubscribe linux-xfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html