[CRIU] [PATCH 2/2 v3] fsnotify: Always provide the path for inotify watchees

Andrew Vagin avagin at odin.com
Wed Oct 14 05:43:11 PDT 2015


On Wed, Oct 14, 2015 at 03:23:05PM +0300, Cyrill Gorcunov wrote:
> On Wed, Oct 14, 2015 at 01:01:44AM +0300, Cyrill Gorcunov wrote:
> > 
> > Update attached (I've added also more comments into a code).
> > Take a look please (I tested inotify tests and containers
> > c/r)
> 
> Here is a version 3 attached, as Andrew pointed we don't have
> to fetch paths for fs which have persistent inodes. Please take
> a look.

> From 87dbc133b815ee9624745838f03966f11db9a0b8 Mon Sep 17 00:00:00 2001
> From: Cyrill Gorcunov <gorcunov at openvz.org>
> Date: Tue, 13 Oct 2015 19:58:22 +0300
> Subject: [PATCH] fsnotify: Always provide the path for inotify watchees
> 
> In debian-8 container we faced the problem -- systemd creates nested
> mount namespaces and inotify watchee are resolved into a path which
> is inaccessbile on restore, the same happens when pathes where
> watchees are living are bind-overmounted. Thus when we try to
> restore such watchees we can't open the paths.
> 
> Lets do a trick here (thanks a huge to Andrew Vagin for idea and
> overall help) -- walk over all mount points which device match
> the handle's device and open handle first and test if the path
> provided is openable as well for tmpfs and devtmps which do not
> save inodes between remounts. After all the inotify objects are
> bound to inode so it's irrelevean via which path it's assigned.
> 
> https://jira.sw.ru/browse/PSBM-39957
> 
> Signed-off-by: Cyrill Gorcunov <gorcunov at openvz.org>
> ---
>  fsnotify.c | 99 +++++++++++++++++++++++++++++++++++++++++++-------------------
>  1 file changed, 69 insertions(+), 30 deletions(-)
> 
> diff --git a/fsnotify.c b/fsnotify.c
> index 931e76785b41..d3e1865c4056 100644
> --- a/fsnotify.c
> +++ b/fsnotify.c
> @@ -139,56 +139,95 @@ out:
>  int check_open_handle(unsigned int s_dev, unsigned long i_ino,
>  		FhEntry *f_handle)
>  {
> +	struct mount_info *m;
> +	fh_t handle;
>  	int fd = -1;
>  	char *path;
>  
> -	fd = open_handle(s_dev, i_ino, f_handle);
> -	if (fd >= 0) {
> -		struct mount_info *mi;
> +	decode_handle(&handle, f_handle);
> +
> +	/*
> +	 * We gonna try to open the handle and then
> +	 * depending on command line options and type
> +	 * of the filesystem (tmpfs/devtmpfs do not
> +	 * preserve their inodes between mounts) we
> +	 * might need to find out an openable path
> +	 * get used on restore as a watch destination.
> +	 */
> +	for (m = mntinfo; m; m = m->next) {
> +		char buf[PATH_MAX], *__path;
> +		int mntfd, openable_fd;
> +
> +		if (m->s_dev != s_dev)
> +			continue;
> +
> +		mntfd = __open_mountpoint(m, -1);
> +		pr_debug("\t\tTrying via mntid %d root %s ns_mountpoint @%s (%d)\n",
> +			 m->mnt_id, m->root, m->ns_mountpoint, mntfd);
> +		if (mntfd < 0)
> +			goto cant_open;
>  
> -		pr_debug("\tHandle 0x%x:0x%lx is openable\n", s_dev, i_ino);
> +		fd = userns_call(open_by_handle, UNS_FDOUT, &handle,
> +				 sizeof(handle), mntfd);
> +		close(mntfd);
> +		if (fd < 0)
> +			goto cant_open;
>  
> -		mi = lookup_mnt_sdev(s_dev);
> -		if (mi == NULL) {
> -			pr_err("Unable to lookup a mount by dev 0x%x\n", s_dev);
> +		/*
> +		 * On tmpfs/devtmps we have to always fetch
> +		 * openable path, in turn on all others
> +		 * it depends on command line option: if
> +		 * we're requested to use irmap lets fetch
> +		 * the path, otherwise simply save the bare
> +		 * handler and that's it.
> +		 */
> +		if ((m->fstype->code != FSTYPE__TMPFS) &&
> +		    (m->fstype->code != FSTYPE__DEVTMPFS)) {
> +			if (!opts.force_irmap)
> +				goto out_nopath;
> +			else
> +				goto force_irmap;
> +		}
> +
> +		if (read_fd_link(fd, buf, sizeof(buf)) < 0) {
> +			close_safe(&fd);
>  			goto err;
>  		}
> +		close_safe(&fd);
>  
>  		/*
> -		 * Inode numbers are not restored for tmpfs content, but we can
> -		 * get file names, becasue tmpfs cache is not pruned.
> +		 * Convert into a relative path.
>  		 */
> -		if ((mi->fstype->code == FSTYPE__TMPFS) ||
> -				(mi->fstype->code == FSTYPE__DEVTMPFS)) {
> -			char p[PATH_MAX];
> +		__path = (buf[1] != '\0') ? buf + 1 : buf;

it (buf[1] == 0)
		__path = ".";

> +		pr_debug("\t\t\tlink as %s\n", __path);
>  
> -			if (read_fd_link(fd, p, sizeof(p)) < 0)
> -				goto err;
> +		mntfd = mntns_get_root_by_mnt_id(m->mnt_id);
> +		if (mntfd < 0)
> +			goto err;
>  
> -			path = xstrdup(p);
> +		openable_fd = openat(mntfd, __path, O_PATH);
> +		/*
> +		 * Close it early, we only interested
> +		 * in openability.
> +		 */
> +		close(openable_fd);

don't need to call close for -1

> +
> +		if (openable_fd >= 0) {
> +			pr_debug("\t\t\topenable as %s\n", __path);
> +			path = xstrdup(buf);
>  			if (path == NULL)
>  				goto err;
>  
>  			f_handle->has_mnt_id = true;
> -			f_handle->mnt_id = mi->mnt_id;
> -
> +			f_handle->mnt_id = m->mnt_id;
>  			goto out;
> -		}
> -
> -		if (!opts.force_irmap)
> -			/*
> -			 * If we're not forced to do irmap, then
> -			 * say we have no path for watch. Otherwise
> -			 * do irmap scan even if the handle is
> -			 * working.
> -			 *
> -			 * FIXME -- no need to open-by-handle if
> -			 * we are in force-irmap and not on tempfs
> -			 */
> -			goto out_nopath;
> +		} else
> +			pr_debug("\t\t\tnot openable as %s (%m)\n", __path);
>  	}
>  
> +cant_open:
>  	pr_warn("\tHandle 0x%x:0x%lx cannot be opened\n", s_dev, i_ino);
> +force_irmap:
>  	path = irmap_lookup(s_dev, i_ino);
>  	if (!path) {
>  		pr_err("\tCan't dump that handle\n");
> -- 
> 2.4.3
> 



More information about the CRIU mailing list