Update kernel-uvm config to support extended attributes with CIFS#15498
Merged
Update kernel-uvm config to support extended attributes with CIFS#15498
Conversation
Contributor
|
Looks good to me. |
6f2f86a to
14fd074
Compare
3b473ef to
3b23019
Compare
danmihai1
approved these changes
Jan 30, 2026
romoh
approved these changes
Jan 30, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Merge Checklist
All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)
*-staticsubpackages, etc.) have had theirReleasetag incremented../cgmanifest.json,./toolkit/scripts/toolchain/cgmanifest.json,.github/workflows/cgmanifest.json)./LICENSES-AND-NOTICES/SPECS/data/licenses.json,./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md,./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON)*.signatures.jsonfilessudo make go-tidy-allandsudo make go-test-coveragepassSummary
What does the PR accomplish, why was it needed?
Context from customer who hit this issue:
"The Storage Mover team supports migration of SMB shares from on-premises environments and public clouds such as AWS (FSx). The service runs the Mover datapath inside a Linux container that performs SMB mounts. Since mounting is a privileged operation requiring root access, the service uses Kata containers. Kata provides the required privileges while maintaining strong isolation, which is critical because Storage Mover is a multi-tenant service and must not allow cross-customer data exposure.
However, the default Kata kernel configuration does not enable ACL support. This limitation prevents access to file ACLs, which are required to support full-fidelity migration of SMB permissions."
... paraphrasing, they are unable to access the extended attributes (CIFS_XATTR) on files they are migrating, so they have no way to migrate the file permissions across platforms. Furthermore, they need to be able to mount NFS volumes inside the Kata VMs.
Change Log
For kernel-uvm x86 only:
Does this affect the toolchain?
NO
Test Methodology