samba-bugs at samba.org
2017-May-26  14:24 UTC
[Bug 12806] New: Deleting in a row of hardlinked snapshots resets file permissions.
https://bugzilla.samba.org/show_bug.cgi?id=12806
            Bug ID: 12806
           Summary: Deleting in a row of hardlinked snapshots resets file
                    permissions.
           Product: rsync
           Version: 3.1.0
          Hardware: All
                OS: All
            Status: NEW
          Severity: normal
          Priority: P5
         Component: core
          Assignee: wayned at samba.org
          Reporter: hww at delember-wyes.de
        QA Contact: rsync-qa at samba.org
Created attachment 13239
  --> https://bugzilla.samba.org/attachment.cgi?id=13239&action=edit
Log file of bug reproduction
Overview:
In an differential backup system with hard-linked copies of unchanged files,
deleting one snapshot resets the permission bit on all files.
Steps to reproduce:
1) Set up a source directory, fill in a couple of files. Some text is just
fine.
Make one of these files have 444 permissions.
2) Set up a different directory to hold snapshots of the source directory.
3) Make a unique name for a snapshot, using e.g. the current date/time.
4) Make a snapshot using rsync:
rsync -ar --itemize-changes src/ snapshots/`echo $snap`/
$snap contains the name of the snapshot. Save this name in a file
"lastsnapshot".
5) Make a new name for a new snapshot and make it using:
rsync -ar --itemize-changes --link-dest=`pwd`/snapshots/`cat lastsnapshot`/
src/ snapshots/`echo $snap`/. Again, save the name of the last snapshot.
6) Repeat step 5) a couple of times. In the snapshot directory, you will get a
row of snapshots. All files in each snapshot is hard-linked to the counterparts
in the other snapshots. Watch the permission bits of the one file with 444
permissions: Everything is ok.
7) Now, deliberately delete one of the snapshots using e.g.
rsync -r --delete `mktemp -d`/ snapshots/2017-05-26-15-00-53/
8) Now all of the files in all snapshots have 644 permissions. This will cause
the re-transmission of that file with the following snapshot.
Actual results: On deletion of a snapshot, hardlinked files get the wrong
permissions.
Expected results: Permission bits should be left intact.
Attached is a log file where I documented this behaviour.
-- 
You are receiving this mail because:
You are the QA Contact for the bug.
samba-bugs at samba.org
2017-May-28  06:16 UTC
[Bug 12806] Deleting in a row of hardlinked snapshots resets file permissions.
https://bugzilla.samba.org/show_bug.cgi?id=12806 --- Comment #1 from Heinz-Willi Wyes <hww at delember-wyes.de> --- Addendum. Thought that the --inplace option could play the trick. I just employed the following: rsync -r --delete --inplace `mktemp -d`/ snapshots/2017-05-28-08-10-11/ But this does not help either. Permission bits get reset to 644 anyway. -- You are receiving this mail because: You are the QA Contact for the bug.
samba-bugs at samba.org
2017-May-28  10:20 UTC
[Bug 12806] Deleting in a row of hardlinked snapshots resets file permissions.
https://bugzilla.samba.org/show_bug.cgi?id=12806 --- Comment #2 from Kevin Korb <rsync at sanitarium.net> --- Just use rm -rf to delete a backup. -- You are receiving this mail because: You are the QA Contact for the bug.
samba-bugs at samba.org
2017-May-29  05:11 UTC
[Bug 12806] Deleting in a row of hardlinked snapshots resets file permissions.
https://bugzilla.samba.org/show_bug.cgi?id=12806 --- Comment #3 from Heinz-Willi Wyes <hww at delember-wyes.de> --- (In reply to Kevin Korb from comment #2) I'd like to, but I can't. I set up a local scenario in order to make the problem most easily reproducible. But the real use case involves rsync in a cloud backup application where I get no acces to the cloud provider's shell. Using any other possible protocol so as e.g. ftp or cifs is practically not possible. Each file operation with these protocols requires a roundtrip to my local server. Such an attempt lasts for hours considering that there are some 100.000 files per snapshot. rsync does this in less than two minutes - but resets the file permissions. -- You are receiving this mail because: You are the QA Contact for the bug.
Lars Ellenberg
2017-May-29  13:21 UTC
[Bug 12806] Deleting in a row of hardlinked snapshots resets file permissions.
Calling chmod only on (optimization: non-empty) directories would fix this.
I don't need to chmod a *file* before unlinking it,
I just need write permission on the directory it is located in.
(Now you have to convince the "appliance" to use a patched rsync ...)
Cheers,
    Lars Ellenberg
diff --git a/delete.c b/delete.c
index 88e4230..223b6d2 100644
--- a/delete.c
+++ b/delete.c
@@ -97,10 +97,10 @@ static enum delret delete_dir_contents(char *fname, uint16
flags)
 		}
 
 		strlcpy(p, fp->basename, remainder);
-		if (!(fp->mode & S_IWUSR) && !am_root && fp->flags
& FLAG_OWNED_BY_US)
-			do_chmod(fname, fp->mode | S_IWUSR);
 		/* Save stack by recursing to ourself directly. */
 		if (S_ISDIR(fp->mode)) {
+			if (!(fp->mode & S_IWUSR) && !am_root && fp->flags
& FLAG_OWNED_BY_US)
+				do_chmod(fname, fp->mode | S_IWUSR);
 			if (delete_dir_contents(fname, flags | DEL_RECURSE) != DR_SUCCESS)
 				ret = DR_NOT_EMPTY;
 		}
@@ -138,14 +138,13 @@ enum delret delete_item(char *fbuf, uint16 mode, uint16
flags)
 			fbuf, (int)mode, (int)flags);
 	}
 
-	if (flags & DEL_NO_UID_WRITE)
-		do_chmod(fbuf, mode | S_IWUSR);
-
 	if (S_ISDIR(mode) && !(flags & DEL_DIR_IS_EMPTY)) {
 		/* This only happens on the first call to delete_item() since
 		 * delete_dir_contents() always calls us w/DEL_DIR_IS_EMPTY. */
 		ignore_perishable = 1;
 		/* If DEL_RECURSE is not set, this just reports emptiness. */
+		if (!(mode & S_IWUSR) && !am_root && flags &
DEL_NO_UID_WRITE && flags & DEL_RECURSE)
+			do_chmod(fbuf, mode | S_IWUSR);
 		ret = delete_dir_contents(fbuf, flags);
 		ignore_perishable = 0;
 		if (ret == DR_NOT_EMPTY || ret == DR_AT_LIMIT)
samba-bugs at samba.org
2017-Jun-08  07:09 UTC
[Bug 12806] Deleting in a row of hardlinked snapshots resets file permissions.
https://bugzilla.samba.org/show_bug.cgi?id=12806
--- Comment #4 from Heinz-Willi Wyes <hww at delember-wyes.de> ---
I got a personal message from Lars Ellenberg that went also to
samba-bugs at samba.org and rsync-qa at samba.org. He wrote:
------------------
Calling chmod only on (optimization: non-empty) directories would fix this.
I don't need to chmod a *file* before unlinking it, I just need write
permission on the directory it is located in.
(Now you have to convince the "appliance" to use a patched rsync ...)
Cheers,
    Lars Ellenberg
diff --git a/delete.c b/delete.c
index 88e4230..223b6d2 100644
--- a/delete.c
+++ b/delete.c
@@ -97,10 +97,10 @@ static enum delret delete_dir_contents(char *fname, uint16
flags)
         }
         strlcpy(p, fp->basename, remainder);
-        if (!(fp->mode & S_IWUSR) && !am_root &&
fp->flags & FLAG_OWNED_BY_US)
-            do_chmod(fname, fp->mode | S_IWUSR);
         /* Save stack by recursing to ourself directly. */
         if (S_ISDIR(fp->mode)) {
+            if (!(fp->mode & S_IWUSR) && !am_root &&
fp->flags &
FLAG_OWNED_BY_US)
+                do_chmod(fname, fp->mode | S_IWUSR);
             if (delete_dir_contents(fname, flags | DEL_RECURSE) != DR_SUCCESS)
                 ret = DR_NOT_EMPTY;
         }
@@ -138,14 +138,13 @@ enum delret delete_item(char *fbuf, uint16 mode, uint16
flags)
             fbuf, (int)mode, (int)flags);
     }
-    if (flags & DEL_NO_UID_WRITE)
-        do_chmod(fbuf, mode | S_IWUSR);
-
     if (S_ISDIR(mode) && !(flags & DEL_DIR_IS_EMPTY)) {
         /* This only happens on the first call to delete_item() since
          * delete_dir_contents() always calls us w/DEL_DIR_IS_EMPTY. */
         ignore_perishable = 1;
         /* If DEL_RECURSE is not set, this just reports emptiness. */
+        if (!(mode & S_IWUSR) && !am_root && flags &
DEL_NO_UID_WRITE && flags
& DEL_RECURSE)
+            do_chmod(fbuf, mode | S_IWUSR);
         ret = delete_dir_contents(fbuf, flags);
         ignore_perishable = 0;
         if (ret == DR_NOT_EMPTY || ret == DR_AT_LIMIT)
-----------------------------
As far as I understand, there actually *is* a design flaw in the rsync
implementation that causes the behavior I described in my original post.
I suggested the patch to my provider. They replied that they rather wait for a
new release of rsync with that patch officially applied.
Now I wonder what the status is. Will there be a patched version of rsync?
-- 
You are receiving this mail because:
You are the QA Contact for the bug.
Lars Ellenberg
2017-Jun-08  13:16 UTC
[Bug 12806] Deleting in a row of hardlinked snapshots resets file permissions.
On Thu, Jun 08, 2017 at 07:09:24AM +0000, just subscribed for rsync-qa from bugzilla via rsync wrote:> https://bugzilla.samba.org/show_bug.cgi?id=12806 > > --- Comment #4 from Heinz-Willi Wyes <hww at delember-wyes.de> --- > I got a personal message from Lars Ellenberg that went also to > samba-bugs at samba.org and rsync-qa at samba.org. He wrote: > > ------------------ > Calling chmod only on (optimization: non-empty) directories would fix this. > I don't need to chmod a *file* before unlinking it, I just need write > permission on the directory it is located in. > > (Now you have to convince the "appliance" to use a patched rsync ...)Note that as long as you have only files (not directories) without write permissions, you can potentially work around this using "--super" (or "--fake-super"), because in that case rsync sets "am_root" to 2 (or -1), "!am_root" becomes false in the various conditions, and the do_chmod() will not even be called. Not sure though what other implications --[fake-]super will have for your usecase. Lars Ellenberg
samba-bugs at samba.org
2017-Jun-12  07:57 UTC
[Bug 12806] Deleting in a row of hardlinked snapshots resets file permissions.
https://bugzilla.samba.org/show_bug.cgi?id=12806 --- Comment #5 from Heinz-Willi Wyes <hww at delember-wyes.de> --- Lars Ellenberg provided a workaround for the behaviour. Using rsync -d --delete --super `mktemp -d`/ snapshots/2017-05-26-15-00-53/ plays the trick. Not sure whether the --super option has implications not suitable for other scenarios. For me it works just fine. Nevertheless, there should be a patch for rsync in order to overcome the questionable behaviour. -- You are receiving this mail because: You are the QA Contact for the bug.
samba-bugs at samba.org
2023-Sep-21  23:47 UTC
[Bug 12806] Deleting in a row of hardlinked snapshots resets file permissions.
https://bugzilla.samba.org/show_bug.cgi?id=12806 --- Comment #6 from Aryo Da <rsync at altfeld-im.de> --- Created attachment 18117 --> https://bugzilla.samba.org/attachment.cgi?id=18117&action=edit MRE (minimal reproducible example) as bash script to reproduce the bug Rename to "setup.sh" and make it executable... -- You are receiving this mail because: You are the QA Contact for the bug.
samba-bugs at samba.org
2023-Sep-21  23:54 UTC
[Bug 12806] Deleting in a row of hardlinked snapshots resets file permissions.
https://bugzilla.samba.org/show_bug.cgi?id=12806 --- Comment #7 from Aryo Da <rsync at altfeld-im.de> --- I think this a severe bug for all backup use cases of rsync that take a full snapshot with permissions (--perms) by creating hardlinks to unchanged files + copies of changed files (--link-dest): -> Whenever an old snapshot is deleted with `rsync --delete` the permissions of the hardlinked files change and trigger another copy of the files in a new snapshot (= waste of storage space and backup run-time). -- You are receiving this mail because: You are the QA Contact for the bug.