X-Loop: help-debbugs@HIDDEN Subject: bug#74766: mv cannot move a file from a Linux "portal" file system Resent-From: Bruno Haible <bruno@HIDDEN> Original-Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org> Resent-CC: bug-coreutils@HIDDEN Resent-Date: Tue, 10 Dec 2024 14:00:02 +0000 Resent-Message-ID: <handler.74766.B.173383917232249 <at> debbugs.gnu.org> Resent-Sender: help-debbugs@HIDDEN X-GNU-PR-Message: report 74766 X-GNU-PR-Package: coreutils X-GNU-PR-Keywords: To: 74766 <at> debbugs.gnu.org X-Debbugs-Original-To: bug-coreutils@HIDDEN Received: via spool by submit <at> debbugs.gnu.org id=B.173383917232249 (code B ref -1); Tue, 10 Dec 2024 14:00:02 +0000 Received: (at submit) by debbugs.gnu.org; 10 Dec 2024 13:59:32 +0000 Received: from localhost ([127.0.0.1]:57426 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from <debbugs-submit-bounces <at> debbugs.gnu.org>) id 1tL0lv-0008O2-AO for submit <at> debbugs.gnu.org; Tue, 10 Dec 2024 08:59:32 -0500 Received: from lists.gnu.org ([209.51.188.17]:38376) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from <bruno@HIDDEN>) id 1tL0lt-0008Nu-Gx for submit <at> debbugs.gnu.org; Tue, 10 Dec 2024 08:59:30 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <bruno@HIDDEN>) id 1tL0lt-0006iv-7v for bug-coreutils@HIDDEN; Tue, 10 Dec 2024 08:59:29 -0500 Received: from mo4-p00-ob.smtp.rzone.de ([81.169.146.219]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <bruno@HIDDEN>) id 1tL0lq-0006gV-Ez for bug-coreutils@HIDDEN; Tue, 10 Dec 2024 08:59:28 -0500 ARC-Seal: i=1; a=rsa-sha256; t=1733839162; cv=none; d=strato.com; s=strato-dkim-0002; b=mUWehl8ti3qVNc8ukHu7CrJ3uZTo7NKs6B4o4ILPP/6hWAgX4/99IqZUk+/mfl1JpQ L3s8J5piRGALo3XcMrLjC1a5XjPFproABnmOqS1PSFWI/TuBv5avr2Qf3kNm9Meqaqxf nIeUOYVL8e2QDFzzwmf2sI9xRqb4NplV9khSzgaPARSSie2/8Ov7ErkMWfyzKFaJJXw7 OM9xjkgnkfHuuTZaE6CJPKMaLF1LNCeFcS6VHiM993oLPwJRbEV1Lz2zQEybumzGg/U+ B0jzeOMFX9hCKIeDiGT1FzhJoMKjo8rPtRbjUmibPDFL2QKvtbYEUjjXq3I1Pskzzq2r jJZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; t=1733839162; s=strato-dkim-0002; d=strato.com; h=Message-ID:Date:Subject:To:From:Cc:Date:From:Subject:Sender; bh=fNTTBTbfWQvds1kHGfMY4Z41qub9EurD9dtpe03GYlE=; b=cNU0Aiui4ijFeRI/aXkDRRt5y/h3sc4PvZH9w0BzK2u32MmTk2ufE68AKmkWWjQAiH W/oqcBxwJmlzH4ssPN0/zQNA6h9NZaG2O7PPDi91Asrls0iItdtVko2AADUB72DNe5Vg Jrsbq/zjMv3evgn4TTnutFkFg7F7tErm18WSkHmuXWjHbEq6lN79dKQ54Dh4Z80BUllC AUrR+OdpEZ07YyICl+OmCov8ZvLw7jJgTEZdUt2wIR3uZ+zDH88SOwP2vDcf/LrxAbef Naukxw/rsb4FAz8q1UE6WEnnt8LxKSK9u7BXkbrxk9n8krgsl+OwEFHt9NPZMjSz+e9L Ijbw== ARC-Authentication-Results: i=1; strato.com; arc=none; dkim=none X-RZG-CLASS-ID: mo00 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1733839162; s=strato-dkim-0002; d=clisp.org; h=Message-ID:Date:Subject:To:From:Cc:Date:From:Subject:Sender; bh=fNTTBTbfWQvds1kHGfMY4Z41qub9EurD9dtpe03GYlE=; b=CZB3fvDoeKws3Ei/k0arGetVhUSuN7sU0NZZgluw0Dhh0DkYT9LIOsYMXUGace9WUi 21tHLsiG6iB0kN/qBnnWEvpX27KxXn+HfKi4Y1hTH9M4MGPcjGu3fafQhQa4+JEFj+QL B9U81jz2LYmqu8V6383Pj9MiQ1tH7x0UwT8p3RdBY6lOrl6iXT2VE7YoxQtoVJIoNwi6 4A1D42l+7S6Q+MKZ1weGQwbtLES9trMkD+TW0wpkckQf0TYvmYIxNzOg+sTTdKPXx+RP uNW8PGPLzF2iJGTfHIecEV+mAdnin04YrcE9ZOnO9cVj6B5LEsC1iPe08owAqGkwusNg PUcA== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; t=1733839162; s=strato-dkim-0003; d=clisp.org; h=Message-ID:Date:Subject:To:From:Cc:Date:From:Subject:Sender; bh=fNTTBTbfWQvds1kHGfMY4Z41qub9EurD9dtpe03GYlE=; b=hPKD/MqAM8sKOjIdIvbXziYbNCKpaB382UiiaCF5IZ5aLViZb/Q6HlC2LMd1pTt4HN 2ugUs+BoW1/2KIa53wDA== X-RZG-AUTH: ":Ln4Re0+Ic/6oZXR1YgKryK8brlshOcZlLnY4jECd2hdUURIbZgL8PX2QiTuZ3cdB8X/nqmicFTps8tOjtGRX7YucGP2mGS4=" Received: from nimes.localnet by smtp.strato.de (RZmta 51.2.11 AUTH) with ESMTPSA id Nd105a0BADxMSv0 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits)) (Client did not present a certificate); Tue, 10 Dec 2024 14:59:22 +0100 (CET) From: Bruno Haible <bruno@HIDDEN> Date: Tue, 10 Dec 2024 14:59:22 +0100 Message-ID: <2311529.ZZOgW5g1CT@nimes> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" Received-SPF: none client-ip=81.169.146.219; envelope-from=bruno@HIDDEN; helo=mo4-p00-ob.smtp.rzone.de X-Spam_score_int: -27 X-Spam_score: -2.8 X-Spam_bar: -- X-Spam_report: (-2.8 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-Spam-Score: -2.3 (--) X-BeenThere: debbugs-submit <at> debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: <debbugs-submit.debbugs.gnu.org> List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=unsubscribe> List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/> List-Post: <mailto:debbugs-submit <at> debbugs.gnu.org> List-Help: <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=help> List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=subscribe> Errors-To: debbugs-submit-bounces <at> debbugs.gnu.org Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org> X-Spam-Score: -3.3 (---) Hi, On Linux (Linux 5.15.0) I have a file /run/user/1000/doc/1316905f/jas-key.gpg (created by visiting https://savannah.gnu.org/users/jas in Firefox and clicking the "Download GPG Key" in that page). It appears to be a regular file: $ ls -l /run/user/1000/doc/1316905f/jas-key.gpg -rw-rw-r-- 1 bruno bruno 7335 Dec 10 14:41 /run/user/1000/doc/1316905f/jas-key.gpg It sits on a file system of type "portal": $ (cd /run/user/1000/doc/1316905f/ && df -m .) Filesystem 1M-blocks Used Available Use% Mounted on portal 1290923 1218257 7019 100% /run/user/1000/doc I'm using 'mv' from GNU coreutils: $ LC_ALL=C mv --version mv (GNU coreutils) 9.4 ... Moving the file to an ext4 file system fails: $ mv /run/user/1000/doc/1316905f/jas-key.gpg . mv: cannot open '/run/user/1000/doc/1316905f/jas-key.gpg' for reading: Too many levels of symbolic links Look at the system calls: $ strace mv /run/user/1000/doc/1316905f/jas-key.gpg . execve("/arch/local/x86_64-linux/bin/mv", ["mv", "/run/user/1000/doc/1316905f/jas-"..., "."], 0x7ffd1f57d410 /* 89 vars */) = 0 brk(NULL) = 0x14a8000 arch_prctl(0x3001 /* ARCH_??? */, 0x7ffcdeb8fe90) = -1 EINVAL (Invalid argument) mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f0e9e8f3000 access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory) openat(AT_FDCWD, "/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3 newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=134075, ...}, AT_EMPTY_PATH) = 0 mmap(NULL, 134075, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f0e9e8d2000 close(3) = 0 openat(AT_FDCWD, "/lib/x86_64-linux-gnu/libselinux.so.1", O_RDONLY|O_CLOEXEC) = 3 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\0\0\0\0\0\0\0"..., 832) = 832 newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=166280, ...}, AT_EMPTY_PATH) = 0 mmap(NULL, 177672, PROT_READ, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0e9e8a6000 mprotect(0x7f0e9e8ac000, 139264, PROT_NONE) = 0 mmap(0x7f0e9e8ac000, 106496, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x6000) = 0x7f0e9e8ac000 mmap(0x7f0e9e8c6000, 28672, PROT_READ, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x20000) = 0x7f0e9e8c6000 mmap(0x7f0e9e8ce000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x27000) = 0x7f0e9e8ce000 mmap(0x7f0e9e8d0000, 5640, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f0e9e8d0000 close(3) = 0 openat(AT_FDCWD, "/lib/x86_64-linux-gnu/libacl.so.1", O_RDONLY|O_CLOEXEC) = 3 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\0\0\0\0\0\0\0"..., 832) = 832 newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=34888, ...}, AT_EMPTY_PATH) = 0 mmap(NULL, 36896, PROT_READ, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0e9e89c000 mprotect(0x7f0e9e89e000, 24576, PROT_NONE) = 0 mmap(0x7f0e9e89e000, 16384, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x7f0e9e89e000 mmap(0x7f0e9e8a2000, 4096, PROT_READ, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x6000) = 0x7f0e9e8a2000 mmap(0x7f0e9e8a4000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x7000) = 0x7f0e9e8a4000 close(3) = 0 openat(AT_FDCWD, "/lib/x86_64-linux-gnu/libattr.so.1", O_RDONLY|O_CLOEXEC) = 3 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\0\0\0\0\0\0\0"..., 832) = 832 newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=26696, ...}, AT_EMPTY_PATH) = 0 mmap(NULL, 28696, PROT_READ, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0e9e894000 mmap(0x7f0e9e896000, 12288, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x7f0e9e896000 mmap(0x7f0e9e899000, 4096, PROT_READ, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x5000) = 0x7f0e9e899000 mmap(0x7f0e9e89a000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x5000) = 0x7f0e9e89a000 close(3) = 0 openat(AT_FDCWD, "/lib/x86_64-linux-gnu/libc.so.6", O_RDONLY|O_CLOEXEC) = 3 read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0P\237\2\0\0\0\0\0"..., 832) = 832 pread64(3, "\6\0\0\0\4\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0"..., 784, 64) = 784 pread64(3, "\4\0\0\0 \0\0\0\5\0\0\0GNU\0\2\0\0\300\4\0\0\0\3\0\0\0\0\0\0\0"..., 48, 848) = 48 pread64(3, "\4\0\0\0\24\0\0\0\3\0\0\0GNU\0I\17\357\204\3$\f\221\2039x\324\224\323\236S"..., 68, 896) = 68 newfstatat(3, "", {st_mode=S_IFREG|0755, st_size=2220400, ...}, AT_EMPTY_PATH) = 0 pread64(3, "\6\0\0\0\4\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0"..., 784, 64) = 784 mmap(NULL, 2264656, PROT_READ, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0e9e66b000 mprotect(0x7f0e9e693000, 2023424, PROT_NONE) = 0 mmap(0x7f0e9e693000, 1658880, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x28000) = 0x7f0e9e693000 mmap(0x7f0e9e828000, 360448, PROT_READ, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1bd000) = 0x7f0e9e828000 mmap(0x7f0e9e881000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x215000) = 0x7f0e9e881000 mmap(0x7f0e9e887000, 52816, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f0e9e887000 close(3) = 0 openat(AT_FDCWD, "/lib/x86_64-linux-gnu/libpcre2-8.so.0", O_RDONLY|O_CLOEXEC) = 3 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\0\0\0\0\0\0\0"..., 832) = 832 newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=613064, ...}, AT_EMPTY_PATH) = 0 mmap(NULL, 615184, PROT_READ, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f0e9e5d4000 mmap(0x7f0e9e5d6000, 438272, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x7f0e9e5d6000 mmap(0x7f0e9e641000, 163840, PROT_READ, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x6d000) = 0x7f0e9e641000 mmap(0x7f0e9e669000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x94000) = 0x7f0e9e669000 close(3) = 0 mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f0e9e5d2000 arch_prctl(ARCH_SET_FS, 0x7f0e9e5d3340) = 0 set_tid_address(0x7f0e9e5d3610) = 3802617 set_robust_list(0x7f0e9e5d3620, 24) = 0 rseq(0x7f0e9e5d3ce0, 0x20, 0, 0x53053053) = 0 mprotect(0x7f0e9e881000, 16384, PROT_READ) = 0 mprotect(0x7f0e9e669000, 4096, PROT_READ) = 0 mprotect(0x7f0e9e89a000, 4096, PROT_READ) = 0 mprotect(0x7f0e9e8a4000, 4096, PROT_READ) = 0 mprotect(0x7f0e9e8ce000, 4096, PROT_READ) = 0 mprotect(0x423000, 4096, PROT_READ) = 0 mprotect(0x7f0e9e92d000, 8192, PROT_READ) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 munmap(0x7f0e9e8d2000, 134075) = 0 statfs("/sys/fs/selinux", 0x7ffcdeb8fed0) = -1 ENOENT (No such file or directory) statfs("/selinux", 0x7ffcdeb8fed0) = -1 ENOENT (No such file or directory) getrandom("\xc1\x7e\x88\x97\xcb\xb4\x9e\x85", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x14a8000 brk(0x14c9000) = 0x14c9000 openat(AT_FDCWD, "/proc/filesystems", O_RDONLY|O_CLOEXEC) = 3 newfstatat(3, "", {st_mode=S_IFREG|0444, st_size=0, ...}, AT_EMPTY_PATH) = 0 read(3, "nodev\tsysfs\nnodev\ttmpfs\nnodev\tbd"..., 1024) = 505 read(3, "", 1024) = 0 close(3) = 0 access("/etc/selinux/config", F_OK) = -1 ENOENT (No such file or directory) geteuid() = 1000 ioctl(0, TCGETS, {B38400 opost isig icanon echo ...}) = 0 renameat2(AT_FDCWD, "/run/user/1000/doc/1316905f/jas-key.gpg", AT_FDCWD, ".", RENAME_NOREPLACE) = -1 EXDEV (Invalid cross-device link) renameat2(AT_FDCWD, "/run/user/1000/doc/1316905f/jas-key.gpg", AT_FDCWD, "jas-key.gpg", RENAME_NOREPLACE) = -1 EXDEV (Invalid cross-device link) newfstatat(AT_FDCWD, "/run/user/1000/doc/1316905f/jas-key.gpg", {st_mode=S_IFREG|0664, st_size=7335, ...}, AT_SYMLINK_NOFOLLOW) = 0 newfstatat(AT_FDCWD, "jas-key.gpg", 0x7ffcdeb8fb30, AT_SYMLINK_NOFOLLOW) = -1 ENOENT (No such file or directory) unlinkat(AT_FDCWD, "jas-key.gpg", 0) = -1 ENOENT (No such file or directory) openat(AT_FDCWD, "/run/user/1000/doc/1316905f/jas-key.gpg", O_RDONLY|O_NOFOLLOW) = -1 ELOOP (Too many levels of symbolic links) write(2, "mv: ", 4mv: ) = 4 write(2, "cannot open '/run/user/1000/doc/"..., 65cannot open '/run/user/1000/doc/1316905f/jas-key.gpg' for reading) = 65 write(2, ": Too many levels of symbolic li"..., 35: Too many levels of symbolic links) = 35 write(2, "\n", 1 ) = 1 lseek(0, 0, SEEK_CUR) = -1 ESPIPE (Illegal seek) close(0) = 0 close(1) = 0 close(2) = 0 exit_group(1) = ? +++ exited with 1 +++ I don't understand the result of the openat() system call. $ cp /run/user/1000/doc/1316905f/jas-key.gpg . works fine. Bruno
Content-Disposition: inline Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Mailer: MIME-tools 5.505 (Entity 5.505) Content-Type: text/plain; charset=utf-8 X-Loop: help-debbugs@HIDDEN From: help-debbugs@HIDDEN (GNU bug Tracking System) To: Bruno Haible <bruno@HIDDEN> Subject: bug#74766: Acknowledgement (mv cannot move a file from a Linux "portal" file system) Message-ID: <handler.74766.B.173383917232249.ack <at> debbugs.gnu.org> References: <2311529.ZZOgW5g1CT@nimes> X-Gnu-PR-Message: ack 74766 X-Gnu-PR-Package: coreutils Reply-To: 74766 <at> debbugs.gnu.org Date: Tue, 10 Dec 2024 14:00:02 +0000 Thank you for filing a new bug report with debbugs.gnu.org. This is an automatically generated reply to let you know your message has been received. Your message is being forwarded to the package maintainers and other interested parties for their attention; they will reply in due course. Your message has been sent to the package maintainer(s): bug-coreutils@HIDDEN If you wish to submit further information on this problem, please send it to 74766 <at> debbugs.gnu.org. Please do not send mail to help-debbugs@HIDDEN unless you wish to report a problem with the Bug-tracking system. --=20 74766: https://debbugs.gnu.org/cgi/bugreport.cgi?bug=3D74766 GNU Bug Tracking System Contact help-debbugs@HIDDEN with problems
X-Loop: help-debbugs@HIDDEN Subject: bug#74766: mv cannot move a file from a Linux "portal" file system Resent-From: Paul Eggert <eggert@HIDDEN> Original-Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org> Resent-CC: bug-coreutils@HIDDEN Resent-Date: Tue, 10 Dec 2024 18:12:02 +0000 Resent-Message-ID: <handler.74766.B74766.173385429313678 <at> debbugs.gnu.org> Resent-Sender: help-debbugs@HIDDEN X-GNU-PR-Message: followup 74766 X-GNU-PR-Package: coreutils X-GNU-PR-Keywords: To: Bruno Haible <bruno@HIDDEN> Cc: 74766 <at> debbugs.gnu.org Received: via spool by 74766-submit <at> debbugs.gnu.org id=B74766.173385429313678 (code B ref 74766); Tue, 10 Dec 2024 18:12:02 +0000 Received: (at 74766) by debbugs.gnu.org; 10 Dec 2024 18:11:33 +0000 Received: from localhost ([127.0.0.1]:59522 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from <debbugs-submit-bounces <at> debbugs.gnu.org>) id 1tL4hp-0003YY-6l for submit <at> debbugs.gnu.org; Tue, 10 Dec 2024 13:11:33 -0500 Received: from mail.cs.ucla.edu ([131.179.128.66]:44804) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from <eggert@HIDDEN>) id 1tL4hk-0003Y6-Tr for 74766 <at> debbugs.gnu.org; Tue, 10 Dec 2024 13:11:32 -0500 Received: from localhost (localhost [127.0.0.1]) by mail.cs.ucla.edu (Postfix) with ESMTP id 98EA83C00FA8A; Tue, 10 Dec 2024 10:11:22 -0800 (PST) Received: from mail.cs.ucla.edu ([127.0.0.1]) by localhost (mail.cs.ucla.edu [127.0.0.1]) (amavis, port 10032) with ESMTP id VTGSYOtSbBJj; Tue, 10 Dec 2024 10:11:22 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by mail.cs.ucla.edu (Postfix) with ESMTP id 4FB7C3C00FA90; Tue, 10 Dec 2024 10:11:22 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.10.3 mail.cs.ucla.edu 4FB7C3C00FA90 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cs.ucla.edu; s=9D0B346E-2AEB-11ED-9476-E14B719DCE6C; t=1733854282; bh=ZMhhMryQmtHTqyaCenzB9EwtdilwU42Ysrsz/dduKSg=; h=Message-ID:Date:MIME-Version:To:From; b=jRaQi2uj7rm40UUEsKLfuslkEJudQKukDesXbyAm/GBiLGn9OSe3LrvRkX9rEyiAu D3R88r1rn+4sa3uOYTDXeq456Yv3r8Zg9oQ9eZOIRy9p5zJRVcxO5qLHMh3vIAvL0x +MVnhkv6ndJ/u+XYx/F0z1Wau6KejrFdU1ZahOB5diK+Aa2RRyolJDPUocPSsEsusC rdxL+fqOwyGZWCGUy4ZpsZ8GzFztYWiKORpIlYzcRRNHw+KAxgBZTyNsly2KeycuWW 12ZvE45w2cs+zMG/VZnflq2pH87MM/8RcME02WDRH4dYHEbMPivYJEQCPGx8bUCUti tx8vuS2th/REw== X-Virus-Scanned: amavis at mail.cs.ucla.edu Received: from mail.cs.ucla.edu ([127.0.0.1]) by localhost (mail.cs.ucla.edu [127.0.0.1]) (amavis, port 10026) with ESMTP id z_EtznFZEqgN; Tue, 10 Dec 2024 10:11:22 -0800 (PST) Received: from [192.168.254.12] (unknown [47.154.27.134]) by mail.cs.ucla.edu (Postfix) with ESMTPSA id 2FB0A3C00FA8A; Tue, 10 Dec 2024 10:11:22 -0800 (PST) Message-ID: <235c0678-3a44-47c8-905e-93f63995719d@HIDDEN> Date: Tue, 10 Dec 2024 10:11:21 -0800 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird References: <2311529.ZZOgW5g1CT@nimes> Content-Language: en-US From: Paul Eggert <eggert@HIDDEN> Organization: UCLA Computer Science Department In-Reply-To: <2311529.ZZOgW5g1CT@nimes> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Score: 0.0 (/) X-BeenThere: debbugs-submit <at> debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: <debbugs-submit.debbugs.gnu.org> List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=unsubscribe> List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/> List-Post: <mailto:debbugs-submit <at> debbugs.gnu.org> List-Help: <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=help> List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=subscribe> Errors-To: debbugs-submit-bounces <at> debbugs.gnu.org Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org> X-Spam-Score: -1.0 (-) On 2024-12-10 05:59, Bruno Haible via GNU coreutils Bug Reports wrote: > newfstatat(AT_FDCWD, "/run/user/1000/doc/1316905f/jas-key.gpg", {st_mode=S_IFREG|0664, st_size=7335, ...}, AT_SYMLINK_NOFOLLOW) = 0 This means /run/user/1000/doc/1316905f/jas-key.gpg is a regular file and its name can be resolved without symlink loops. > openat(AT_FDCWD, "/run/user/1000/doc/1316905f/jas-key.gpg", O_RDONLY|O_NOFOLLOW) = -1 ELOOP (Too many levels of symbolic links) This means /run/user/1000/doc/1316905f/jas-key.gpg is a symlink, or there is a symlink loop when resolving /run or /run/user or ... or /run/user/1000/doc/1316905f. Which obviously contradicts the newfstatat results. > I don't understand the result of the openat() system call. Yes, it looks like a filesystem bug. I see a similar bug reported (but incorrectly diagnosed) here: https://github.com/flatpak/xdg-desktop-portal/issues/1117 > $ cp /run/user/1000/doc/1316905f/jas-key.gpg . > works fine. Presumably this is because cp uses "openat(AT_FDCWD, "/run/user/1000/doc/1316905f/jas-key.gpg", O_RDONLY)", i.e., cp doesn't use the O_NOFOLLOW flag and so it sidesteps the filesystem bug. Assuming it's a FUSE portal filesystem, the bug could be either in the Linux FUSE kernel module, or (more likely) in the user-space code. I assume you are using GVFS, and I reproduced a similar problem, so I filed a bug report with the GVFS folks here: https://gitlab.gnome.org/GNOME/gvfs/-/issues/774 I don't see how coreutils could easily work around these filesystem bugs.
X-Loop: help-debbugs@HIDDEN Subject: bug#74766: mv cannot move a file from a Linux "portal" file system Resent-From: Bruno Haible <bruno@HIDDEN> Original-Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org> Resent-CC: bug-coreutils@HIDDEN Resent-Date: Tue, 10 Dec 2024 18:24:01 +0000 Resent-Message-ID: <handler.74766.B74766.173385499316947 <at> debbugs.gnu.org> Resent-Sender: help-debbugs@HIDDEN X-GNU-PR-Message: followup 74766 X-GNU-PR-Package: coreutils X-GNU-PR-Keywords: To: Paul Eggert <eggert@HIDDEN> Cc: 74766 <at> debbugs.gnu.org Received: via spool by 74766-submit <at> debbugs.gnu.org id=B74766.173385499316947 (code B ref 74766); Tue, 10 Dec 2024 18:24:01 +0000 Received: (at 74766) by debbugs.gnu.org; 10 Dec 2024 18:23:13 +0000 Received: from localhost ([127.0.0.1]:59534 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from <debbugs-submit-bounces <at> debbugs.gnu.org>) id 1tL4t6-0004PG-Hk for submit <at> debbugs.gnu.org; Tue, 10 Dec 2024 13:23:12 -0500 Received: from mo4-p00-ob.smtp.rzone.de ([85.215.255.22]:35427) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from <bruno@HIDDEN>) id 1tL4t3-0004P0-Tn for 74766 <at> debbugs.gnu.org; Tue, 10 Dec 2024 13:23:10 -0500 ARC-Seal: i=1; a=rsa-sha256; t=1733854987; cv=none; d=strato.com; s=strato-dkim-0002; b=VXZRMvYB8QAK8uBa22J+QhAkNvUN1CmulLN2a7qTBJVyrbW1Du8djSHlU1Uqg4ZcCm Ufcchue1Qzn6ztadR0UvLsC2RTKQMFpFqxViS2HRh/1UgzjSb8XARXSE8yIe1lGnzjbN dHEA03TjP9V+BuUsEy5VrzSi+dZQudt+d5OGpIyWFVLAMIvdND0EMzbKLVk8hYibkeRp yVSl8/yeAMM6jo/sUAKxjdvdXMFIsLhKPYRPE6Poee563VciAoS56CkxDA0PIaEwMiGQ xa9g1eVME+EpDfcSZPUBjYoObSEu4hGFxZei4OvmIMHiFarlLn4dKsY/Im7PbmzncGQs WdLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; t=1733854987; s=strato-dkim-0002; d=strato.com; h=References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From:Cc:Date: From:Subject:Sender; bh=bj9gzknqzydjvl/pZOWJGyYyJfqkVlqUmRBJmwEcWVk=; b=Je63dGd+HDFEbG4+nDeOd0ro95YIiShpp/kM3UYSwVazpi34Rjh1u5ZXO/z1bGMbaw WSneJLBX7NEGZYJBFlh2Biqc01MQQugsJyuVcyHW+IHr7rf8/Ap0IAFg8/3asNHiGiHI tusXwcMlwf81U5w94LR+qk5yywEQ52VgRHvBrFX+Duq34P+SKo/h6uLKjg3ymXiDu06g Y+rZdgmA/kaoA/ux1yDr44yLe2mESW21Fg7aIYWwv59J6Mzrg31GQpWSPYwSf5V0wwBY 3wnSOMqDNid9JN4sZ3d0BUTYgu/Z4wgYIyBwLOrA3v68BNuTnbJQv2qofrz+rOWniAnM Rm8Q== ARC-Authentication-Results: i=1; strato.com; arc=none; dkim=none X-RZG-CLASS-ID: mo00 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1733854987; s=strato-dkim-0002; d=clisp.org; h=References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From:Cc:Date: From:Subject:Sender; bh=bj9gzknqzydjvl/pZOWJGyYyJfqkVlqUmRBJmwEcWVk=; b=ezfKn/wRpHcmk8OrmCsy9HrYQcImRXLrLCB+QrCq9LWKFXLIZOCyuFmGZ2pB9pwpRt i4Z/Sl0bepW80+JOimbL7avRif36IA8LOI9LT1pmntqCaIgiLchlFp62z8cScKpRi7L2 VecA/ToTC5Ed4NI0DI/vmeYroz17muUpiEPadXvMltyfucYXxJl+cTOyrcCZT6xmkif0 NxHEGXhUysjNo2Y5TElz3wtoodSMO3otmDGB+7Sd/B/8C4epOMSpp8k/ta11vrnFHeLP /kTYIQ02XwMZlRnL5DIJqT99QR5IPkyLPk+QNwuQlSZN6c749hsOkmU1FFZDcYmYBkT6 wD6w== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; t=1733854987; s=strato-dkim-0003; d=clisp.org; h=References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From:Cc:Date: From:Subject:Sender; bh=bj9gzknqzydjvl/pZOWJGyYyJfqkVlqUmRBJmwEcWVk=; b=sWqvQcmU4kalOOnjlD12d82qebVJSLza4Knl+EsgD7UXqHLBZPlM9QincVqwYMUx6p AVrc/WW2vLoB3OuCyYDw== X-RZG-AUTH: ":Ln4Re0+Ic/6oZXR1YgKryK8brlshOcZlLnY4jECd2hdUURIbZgL8PX2QiTuZ3cdB8X/nqmicFTps8tOjtGRX7YucGP2mGS4=" Received: from nimes.localnet by smtp.strato.de (RZmta 51.2.11 AUTH) with ESMTPSA id Nd105a0BAIN6U9E (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits)) (Client did not present a certificate); Tue, 10 Dec 2024 19:23:06 +0100 (CET) From: Bruno Haible <bruno@HIDDEN> Date: Tue, 10 Dec 2024 19:23:05 +0100 Message-ID: <2483301.Qy3A1AUfiQ@nimes> In-Reply-To: <235c0678-3a44-47c8-905e-93f63995719d@HIDDEN> References: <2311529.ZZOgW5g1CT@nimes> <235c0678-3a44-47c8-905e-93f63995719d@HIDDEN> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-Spam-Score: 0.0 (/) X-BeenThere: debbugs-submit <at> debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: <debbugs-submit.debbugs.gnu.org> List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=unsubscribe> List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/> List-Post: <mailto:debbugs-submit <at> debbugs.gnu.org> List-Help: <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=help> List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=subscribe> Errors-To: debbugs-submit-bounces <at> debbugs.gnu.org Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org> X-Spam-Score: -1.0 (-) Thanks for the investigations. Paul Eggert wrote: > Assuming it's a FUSE portal filesystem, the bug could be either in the > Linux FUSE kernel module, or (more likely) in the user-space code. I > assume you are using GVFS Yes, indeed: $ mount ... portal on /run/user/1000/doc type fuse.portal (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000) ... > and I reproduced a similar problem, so I > filed a bug report with the GVFS folks here: > > https://gitlab.gnome.org/GNOME/gvfs/-/issues/774 Thanks! Bruno
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd,
1994-97 Ian Jackson.