You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Looks like GETXATTR "security.capability" is called for every write that comes in from the user application. Note that a user application write can be larger than 128kB, and then is split up to 128kB by the kernel. Then we only get one GETXATTR for multiple WRITE commands.
"I believe that this is occurring because in mm/
filemap.c:__generic_file_aio_write_nolock() there's a call to
file_remove_suid() which down the call graph a ways tries to remove
the capabilities, but does so by checking to see if the capabilities
xattr is there before it attempts to delete it."
--jmike
The text was updated successfully, but these errors were encountered:
Looks like
GETXATTR "security.capability"
is called for every write that comes in from the user application. Note that a user application write can be larger than 128kB, and then is split up to 128kB by the kernel. Then we only get one GETXATTR for multiple WRITE commands.dd bs=128k count=2 (GETXATTR after each WRITE):
dd bs=256k count=1 (GETXATTR called only once after two WRITEs):
See also
Quoting a message from the thread above :
The text was updated successfully, but these errors were encountered: