From owner-freebsd-bugs@FreeBSD.ORG Tue Oct 28 04:49:08 2014 Return-Path: Delivered-To: freebsd-bugs@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 804C8372 for ; Tue, 28 Oct 2014 04:49:08 +0000 (UTC) Received: from mta1.riverwillow.net.au (mta1.riverwillow.net.au [IPv6:2001:8000:1000:1801::36]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mta1.riverwillow.net.au", Issuer "Riverwillow Root Certificate 2010-04-12" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 0CF3BC1B for ; Tue, 28 Oct 2014 04:49:07 +0000 (UTC) Received: from mail1.riverwillow.net.au (mail1.riverwillow.net.au [IPv6:2001:8000:1000:1801::46]) by mta1.riverwillow.net.au (8.14.9/8.14.9) with ESMTP id s9S4mq8H047426 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 28 Oct 2014 15:48:52 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=riverwillow.com.au; s=mta1002; t=1414471732; bh=I76ugPUt8tOn1zagvRkxDawA7hTRihizrblT3CPH2OU=; h=Date:From:To:Cc:Subject:References:In-Reply-To; b=jiERfrn0QuVnn6wQxdCJ4yLqd6ZKsaBVEmyi7RsaluQnrGGUzTiRsMGy8o1AvXRsW BlUvq+hMFfOtAGC8IIca6o3lLTC9+Bfxs8jFUL6p3XH49iUC+FKzfdxCCu80fJ6lLk OT17sTz7+nGehf45WD0Aw989ZiveIuUcQySVYmbA= Received: from rwpc15.gfn.riverwillow.net.au (rwpc15.gfn.riverwillow.net.au [IPv6:2001:8000:1000:18e1:20c:76ff:fe0a:2117]) (authenticated bits=56) by mail1.riverwillow.net.au (8.14.9/8.14.9) with ESMTP id s9S4mjP5047424 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Tue, 28 Oct 2014 15:48:48 +1100 (AEDT) Date: Tue, 28 Oct 2014 15:48:45 +1100 From: John Marshall To: "John D. Hendrickson and Sara Darnell" Subject: Re: [Bug 194477] 10.1-RC1 tar(1) spurious directory permission error message Message-ID: <20141028044845.GB5687@rwpc15.gfn.riverwillow.net.au> References: <6PZF1p00b2X408g01PZGNi> <544EE93A.8040707@cox.net> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="Dxnq1zWXvFF0Q93v" Content-Disposition: inline In-Reply-To: <544EE93A.8040707@cox.net> OpenPGP: id=A29A84A2; url=http://pki.riverwillow.com.au/pgp/johnmarshall.asc User-Agent: Mutt/1.5.23 (2014-03-12) Cc: freebsd-bugs@FreeBSD.org X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 28 Oct 2014 04:49:08 -0000 --Dxnq1zWXvFF0Q93v Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, 27 Oct 2014, 19:54 -0500, John D. Hendrickson and Sara Darnell wrot= e: > bugzilla-noreply@freebsd.org wrote: > > https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D194477 > >=20 > > --- Comment #1 from John Marshall --- > > Confirmed independently on -stable@ > >=20 > > https://lists.freebsd.org/pipermail/freebsd-stable/2014-October/080685.= html > >=20 > > The scenario of traversal-only access to the parent directory is common= in a > > situation where the directory contains per-user subdirectories, and eac= h user > > has no business knowing about any subdirectory but his own. > >=20 > > The archive generated is fine, the user has full permission to the dire= ctory > > being archived, but tar(1) exits with an error status. > >=20 > > I regard this regression as a bug. > >=20 >=20 > i'll bite very interesting >=20 > is the error on tar or utar ? i assume you mean on tar -c but be=20 > specific [as per Bug 194477 report] tar -c -C > is this new or do older version NOT do this? if so please state the=20 > right and wrong tar versions. [as per Bug 194477 report] Bug observed in 10.1-RC3. Fine =3D< 9.3-RELEASE > also i need a firm permission basis. just because you are in same=20 > group may not be the same as owning (w/respect to utar, not tar) and=20 > if your using any "kernel extended permissions" (tar obviously uses=20 > only unix file security / bits. it stores file perms also user # in=20 > tar header) Specific permissions documented in Bug 194477 report. Error is triggered if process running tar -c -C . does not have +r access to the parent of the directory . If the tar process has +x access only to the parent of the -C (and full access to ) then the tar archive is written correctly but tar exits with an error because it cannot read 's parent directory. It looks like the earlier tar used chdir() to walk back up the tree at the end whereas the current tar uses openat() and tries to openat() the parent of after the tree has been processed - and fails due to lack of +r access. > i don't see any follow-ups just the initial comlaint, did this=20 > complain expire ? Nobody has picked this up yet but another user on -stable@ confirmed the problem and provided an even simpler test case. --=20 John Marshall --Dxnq1zWXvFF0Q93v Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iEYEARECAAYFAlRPIC0ACgkQw/tAaKKahKIs+gCgxbQtX3NmzjdKwgEeA6Thpznx 05EAniv+2WYvR70BQX2+/VWG7Pr6xUgv =2IRX -----END PGP SIGNATURE----- --Dxnq1zWXvFF0Q93v--