From nobody Mon Feb 9 10:58:25 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1620824258; cv=none; d=zohomail.com; s=zohoarc; b=TmNPXQRbfWkqBmMZu2EbwcRfs0c5+A1c/y5j5e8i9motWKTSs2wvCxlea2P2U+ZK/6tmMVFm97WE0996/hhZLR/l0zvcfymd5mBeFj3DWUPvgQgvxDCBMzfIv5AtkWIvNdm/ecwzg/04mYTPRjgZ6DW4NEFa4Mi+LptL1xIGd6E= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1620824258; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=iHqch7dt8hGMmsrFm3yGZrFixz04SjMM3avRpX1cQQw=; b=C1+i/BKx7wc5gCwcoOiK5mzR9EQCC9IWsh/BR25g8ubo01S2FUcVw1XZwIxWLFUXtN4CXt/uZAtVvm3o2rXsWgKPhkfl39NtXHCIIsGtDT89vbcFERtsuBCGWaqYjx0HFDjp5+13Skgv+LRyQIoGHl/wU/jx8hcphVlEjIdm39o= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1620824258278459.30909241132804; Wed, 12 May 2021 05:57:38 -0700 (PDT) Received: from localhost ([::1]:34948 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1lgoQi-0008Mc-Qp for importer@patchew.org; Wed, 12 May 2021 08:57:36 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:39852) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1lgoPB-0005rv-Ua for qemu-devel@nongnu.org; Wed, 12 May 2021 08:56:01 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:42169) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1lgoPA-0004Ox-0A for qemu-devel@nongnu.org; Wed, 12 May 2021 08:56:01 -0400 Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-569-WwCx50HYPHOlIcK8p1pwNQ-1; Wed, 12 May 2021 08:55:56 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id F0F6D107ACC7 for ; Wed, 12 May 2021 12:55:55 +0000 (UTC) Received: from localhost (ovpn-114-121.ams2.redhat.com [10.36.114.121]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 70BA16091A; Wed, 12 May 2021 12:55:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1620824159; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=iHqch7dt8hGMmsrFm3yGZrFixz04SjMM3avRpX1cQQw=; b=Wguk26Wx3NIFnHZk6z8NjB7VWs3GaEZ0tuJkmoyuHo+fiQaKstyfe9vT+1Dt5qu8XY8Yqx +7M5r6somPVkkq1F3cJOxbJi70dtUZLhebH+M/YM8BuCBPgc0ypY1kGuuS8U08S/+Z0Nop OgfUQ8lCBZQX+3jJ73/DzjYUiDvxYDU= X-MC-Unique: WwCx50HYPHOlIcK8p1pwNQ-1 From: Max Reitz To: qemu-devel@nongnu.org Subject: [PATCH 1/3] virtiofsd: Find original inode ID of mount points Date: Wed, 12 May 2021 14:55:42 +0200 Message-Id: <20210512125544.9536-2-mreitz@redhat.com> In-Reply-To: <20210512125544.9536-1-mreitz@redhat.com> References: <20210512125544.9536-1-mreitz@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=mreitz@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Transfer-Encoding: quoted-printable Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=216.205.24.124; envelope-from=mreitz@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -34 X-Spam_score: -3.5 X-Spam_bar: --- X-Spam_report: (-3.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.7, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: "Dr . David Alan Gilbert" , Stefan Hajnoczi , Max Reitz Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) Content-Type: text/plain; charset="utf-8" Mount point directories represent two inodes: On one hand, they are a normal directory on their parent filesystem. On the other, they are the root node of the filesystem mounted there. Thus, they have two inode IDs. Right now, we only report the latter inode ID (i.e. the inode ID of the mounted filesystem's root node). This is fine once the guest has auto-mounted a submount there (so this inode ID goes with a device ID that is distinct from the parent filesystem), but before the auto-mount, they have the device ID of the parent and the inode ID for the submount. This is problematic because this is likely exactly the same st_dev/st_ino combination as the parent filesystem's root node. This leads to problems for example with `find`, which will thus complain about a filesystem loop if it has visited the parent filesystem's root node before, and then refuse to descend into the submount. There is a way to find the mount directory's original inode ID, and that is to readdir(3) the parent directory, look for the mount directory, and read the dirent.d_ino field. Using this, we can let lookup and readdirplus return that original inode ID, which the guest will thus show until the submount is auto-mounted. (Then, it will invoke getattr and that stat(2) call will return the inode ID for the submount.) Signed-off-by: Max Reitz Reviewed-by: Connor Kuehl --- tools/virtiofsd/passthrough_ll.c | 104 +++++++++++++++++++++++++++++-- 1 file changed, 99 insertions(+), 5 deletions(-) diff --git a/tools/virtiofsd/passthrough_ll.c b/tools/virtiofsd/passthrough= _ll.c index 1553d2ef45..110b6e7e5b 100644 --- a/tools/virtiofsd/passthrough_ll.c +++ b/tools/virtiofsd/passthrough_ll.c @@ -968,14 +968,87 @@ static int do_statx(struct lo_data *lo, int dirfd, co= nst char *pathname, return 0; } =20 +/* + * Use readdir() to find mp_name's inode ID on the parent's filesystem. + * (For mount points, stat() will only return the inode ID on the + * filesystem mounted there, i.e. the root directory's inode ID. The + * mount point originally was a directory on the parent filesystem, + * though, and so has a different inode ID there. When passing + * submount information to the guest, we need to pass this other ID, + * so the guest can use it as the inode ID until the submount is + * auto-mounted. (At which point the guest will invoke getattr and + * find the inode ID on the submount.)) + * + * Return 0 on success, and -errno otherwise. *pino is set only in + * case of success. + */ +static int get_mp_ino_on_parent(const struct lo_inode *dir, const char *mp= _name, + ino_t *pino) +{ + int dirfd =3D -1; + int ret; + DIR *dp =3D NULL; + + dirfd =3D openat(dir->fd, ".", O_RDONLY); + if (dirfd < 0) { + ret =3D -errno; + goto out; + } + + dp =3D fdopendir(dirfd); + if (!dp) { + ret =3D -errno; + goto out; + } + /* Owned by dp now */ + dirfd =3D -1; + + while (true) { + struct dirent *de; + + errno =3D 0; + de =3D readdir(dp); + if (!de) { + ret =3D errno ? -errno : -ENOENT; + goto out; + } + + if (!strcmp(de->d_name, mp_name)) { + *pino =3D de->d_ino; + ret =3D 0; + goto out; + } + } + +out: + if (dp) { + closedir(dp); + } + if (dirfd >=3D 0) { + close(dirfd); + } + return ret; +} + /* * Increments nlookup on the inode on success. unref_inode_lolocked() must= be * called eventually to decrement nlookup again. If inodep is non-NULL, the * inode pointer is stored and the caller must call lo_inode_put(). + * + * If parent_fs_st_ino is true, the entry is a mount point, and submounts = are + * announced to the guest, set e->attr.st_ino to the entry's inode ID on i= ts + * parent filesystem instead of its inode ID on the filesystem mounted on = it. + * (For mount points, the entry encompasses two inodes: One on the parent = FS, + * and one on the mounted FS (where it is the root node), so it has two in= ode + * IDs. When looking up entries, we should show the guest the parent FS's= inode + * ID, because as long as the guest has not auto-mounted the submount, it = should + * see that original ID. Once it does perform the auto-mount, it will inv= oke + * getattr and see the root node's inode ID.) */ static int lo_do_lookup(fuse_req_t req, fuse_ino_t parent, const char *nam= e, struct fuse_entry_param *e, - struct lo_inode **inodep) + struct lo_inode **inodep, + bool parent_fs_st_ino) { int newfd; int res; @@ -984,6 +1057,7 @@ static int lo_do_lookup(fuse_req_t req, fuse_ino_t par= ent, const char *name, struct lo_data *lo =3D lo_data(req); struct lo_inode *inode =3D NULL; struct lo_inode *dir =3D lo_inode(req, parent); + ino_t ino_id_for_guest; =20 if (inodep) { *inodep =3D NULL; /* in case there is an error */ @@ -1018,9 +1092,22 @@ static int lo_do_lookup(fuse_req_t req, fuse_ino_t p= arent, const char *name, goto out_err; } =20 + ino_id_for_guest =3D e->attr.st_ino; + if (S_ISDIR(e->attr.st_mode) && lo->announce_submounts && (e->attr.st_dev !=3D dir->key.dev || mnt_id !=3D dir->key.mnt_id))= { e->attr_flags |=3D FUSE_ATTR_SUBMOUNT; + + if (parent_fs_st_ino) { + /* + * Best effort, so ignore errors. + * Also note that using readdir() means there may be races: + * The directory entry we find (if any) may be different + * from newfd. Again, this is a best effort. Reporting + * the wrong inode ID to the guest is not catastrophic. + */ + get_mp_ino_on_parent(dir, name, &ino_id_for_guest); + } } =20 inode =3D lo_find(lo, &e->attr, mnt_id); @@ -1043,6 +1130,10 @@ static int lo_do_lookup(fuse_req_t req, fuse_ino_t p= arent, const char *name, =20 inode->nlookup =3D 1; inode->fd =3D newfd; + /* + * For the inode key, use the dev/ino/mnt ID as reported by stat() + * (i.e. not ino_id_for_guest) + */ inode->key.ino =3D e->attr.st_ino; inode->key.dev =3D e->attr.st_dev; inode->key.mnt_id =3D mnt_id; @@ -1058,6 +1149,9 @@ static int lo_do_lookup(fuse_req_t req, fuse_ino_t pa= rent, const char *name, } e->ino =3D inode->fuse_ino; =20 + /* Report ino_id_for_guest to the guest */ + e->attr.st_ino =3D ino_id_for_guest; + /* Transfer ownership of inode pointer to caller or drop it */ if (inodep) { *inodep =3D inode; @@ -1104,7 +1198,7 @@ static void lo_lookup(fuse_req_t req, fuse_ino_t pare= nt, const char *name) return; } =20 - err =3D lo_do_lookup(req, parent, name, &e, NULL); + err =3D lo_do_lookup(req, parent, name, &e, NULL, true); if (err) { fuse_reply_err(req, err); } else { @@ -1217,7 +1311,7 @@ static void lo_mknod_symlink(fuse_req_t req, fuse_ino= _t parent, goto out; } =20 - saverr =3D lo_do_lookup(req, parent, name, &e, NULL); + saverr =3D lo_do_lookup(req, parent, name, &e, NULL, false); if (saverr) { goto out; } @@ -1714,7 +1808,7 @@ static void lo_do_readdir(fuse_req_t req, fuse_ino_t = ino, size_t size, =20 if (plus) { if (!is_dot_or_dotdot(name)) { - err =3D lo_do_lookup(req, ino, name, &e, NULL); + err =3D lo_do_lookup(req, ino, name, &e, NULL, true); if (err) { goto error; } @@ -1936,7 +2030,7 @@ static void lo_create(fuse_req_t req, fuse_ino_t pare= nt, const char *name, goto out; } =20 - err =3D lo_do_lookup(req, parent, name, &e, &inode); + err =3D lo_do_lookup(req, parent, name, &e, &inode, false); if (err) { goto out; } --=20 2.31.1