Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp466845rdb; Mon, 29 Jan 2024 07:43:56 -0800 (PST) X-Google-Smtp-Source: AGHT+IG9qC+F0O1tdpjSNR4NdYAD3KexWpiPAgSA9YM5x/1MrKqhn5SmKeIRMbEC5a+X1t1+SP49 X-Received: by 2002:ac8:5d07:0:b0:42a:32e8:d4b5 with SMTP id f7-20020ac85d07000000b0042a32e8d4b5mr7953258qtx.1.1706543036256; Mon, 29 Jan 2024 07:43:56 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706543036; cv=pass; d=google.com; s=arc-20160816; b=Rt1qH1b5546GWwdnjzN4//FxUB8tG2cQXjV7Z2RvJ4yf2smYd7+4NliKk7m2SNr9QS z3IqjXsmLEu33obVxA/ihqZCuBRx9TG9TU2nxBIFg2HJJnoTOOzEAJu9jj6D0ZS6kcqZ HPM2wlK61+b5K+YY8L1usiVt+IZuV/7ccrLxzpaGj4h8e2lO6ODeOgwVbXX8mex+agCe H5XK+ALAFevdPsh4QnKgCiYViV+DY7gxOcBvn0tilWnqjpBUdPTdqg4uLVuEgOVTGLNb G2sRTjzCF9Ryqz6DOOPX/EUV/1Uyb04HOgKp7v8XQ3GiJuMNsbE/Ubv0n7ixawR5UIN1 Dy6g== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=FmVwiL7ssmvBS/Rk3AP7EZwNHMhnVZ9IcleUiv9ucoo=; fh=I7G+qYoj6CEjsX1e9xZhATP/5pSe628eVuhCn7/T5Fc=; b=TZLqYJt33FxDO3+K6M6raW68uUsf66GNZ94P9mxH+zwu8nLDBOi1QljrUw2OD1qafn aD7AurBbAtp9XWaN6gn2AGLSM8jgMs8ccCDFT4ONYt15DtDVGLXbydJYfGvQ2VWxVQlG shrO/1hlu5StPAy8yDi1sBbH3k9QMxFfjoQ8jgu+tRk0Y4L9k0OZeudJKgWiJPdzqHB7 1Jlwr97NF9ure2l2UpS3etoUmn7bdszslJOBFJXEXdx14K6q/vIPed05ex7D648V/l2g 5b5dQ8kAhUzSrzwXfvTXemmwmLUE1c3ef4P8tLnFTauGLgoN1Of2H1yccXY5YTnl27wy LGcA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=MUe+POmJ; arc=pass (i=1 spf=pass spfdomain=canonical.com dkim=pass dkdomain=canonical.com dmarc=pass fromdomain=canonical.com); spf=pass (google.com: domain of linux-kernel+bounces-43023-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-43023-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id k12-20020ac8474c000000b0042a81457e7fsi6870063qtp.36.2024.01.29.07.43.56 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 29 Jan 2024 07:43:56 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-43023-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=MUe+POmJ; arc=pass (i=1 spf=pass spfdomain=canonical.com dkim=pass dkdomain=canonical.com dmarc=pass fromdomain=canonical.com); spf=pass (google.com: domain of linux-kernel+bounces-43023-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-43023-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 07BA91C22CBA for ; Mon, 29 Jan 2024 15:43:56 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 58A61156972; Mon, 29 Jan 2024 15:42:49 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=canonical.com header.i=@canonical.com header.b="MUe+POmJ" Received: from smtp-relay-internal-0.canonical.com (smtp-relay-internal-0.canonical.com [185.125.188.122]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B284D154445 for ; Mon, 29 Jan 2024 15:42:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=185.125.188.122 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706542968; cv=none; b=ILTYKAxF072bymuk1HOsjgjsY3VzYK/gbYA8KHkjMohEjrjsTdlFmAjviVil+rTiZ9Pm2Tzc2slXtujLlkVaLlQQE0p0pN8YnwCsZ6WiKZUPAwhdp2sf9E/iASQtOGAhLiXfYG/G40vZGd8VC1YoOnvRYUWk3aaiPP876VBFpWo= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706542968; c=relaxed/simple; bh=E2pz83SaHUUBSu+k2FmR9GyqPifnumB7xkbI8/ZNP6c=; h=Date:From:To:Cc:Subject:Message-Id:In-Reply-To:References: Mime-Version:Content-Type; b=IWFaXWHFRBCBbWbDo/0DDxIif28YEQMW3UIxoo+CQicxWTZ04VCWZlZsmOuWb+SSxEESv2foaU03G+qjA73MY9WYAHf8v09z0AObssPPWZpl83SB/7PBBH1OX2Vb+wgZ/VdaOceP1LelX1f0wlgQgsN6gx4KqY4a4/Yn2NR+05E= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=canonical.com; spf=pass smtp.mailfrom=canonical.com; dkim=pass (2048-bit key) header.d=canonical.com header.i=@canonical.com header.b=MUe+POmJ; arc=none smtp.client-ip=185.125.188.122 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=canonical.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=canonical.com Received: from mail-ej1-f71.google.com (mail-ej1-f71.google.com [209.85.218.71]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 3C7EA3FD9F for ; Mon, 29 Jan 2024 15:42:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1706542962; bh=FmVwiL7ssmvBS/Rk3AP7EZwNHMhnVZ9IcleUiv9ucoo=; h=Date:From:To:Cc:Subject:Message-Id:In-Reply-To:References: Mime-Version:Content-Type; b=MUe+POmJwanreQNkMuyXUEq1Gmq9m0Zpn4dwmRWFZQ5BzDHtJDEdYSbd9rki/VMhn dfeKT+ZUKscxbYDeyC3KelkrTJw1HbA7L9P7QTOlOe6BfmIElvg+wjzi/K0Jk+y0xF y65fe92JueevglKGclECrr2iB95ErVFt+4SCp2UZLlAY8GQysEiPd2itKVm//iUhZr KP7Xg0A+mkx/gS8biAlzu8ZQklRHklnZknAQTOd5MdTbkG/Gkcsst1k+IkrN4SLULj t69SIeJzDyouJzA+9nLCib2mpNC1TJbwZvsDwPTm9iVjqMNyeIwfjs2IswUrau5pcn 9cKF1KwKjHLuw== Received: by mail-ej1-f71.google.com with SMTP id a640c23a62f3a-a35a649c608so68701166b.2 for ; Mon, 29 Jan 2024 07:42:42 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706542961; x=1707147761; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:subject:cc:to:from:date:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=FmVwiL7ssmvBS/Rk3AP7EZwNHMhnVZ9IcleUiv9ucoo=; b=CAzXIZ0zmKI7X5VqKrT+MfGJHelkYOMir1Jffb7Bev4Nz9IGBQueMWv/AIZobyJrBZ gS+fiGXIwpYMbJTvwLeH1d1NEHRWwliRxuLGZJSzGwuBD3ZDZJcWHLbG1I5oBPdFX+29 j57B0DKZvmFe2bynALPFriX+3ogHcbXprd2KK2OIK/rWBq4MYokvZroxePfvPdvIZfbS rlyJ7sdSYIFfpocKRQci7I1a6+ne/iQO1zfQpJyrUouDJJPU+9bEXaLFd0cjMuTouRI9 XXomQUZ7zHhHxid2aU1K27OXqWLqk+xZMG4BfbQ+nGeIXH1nTjztNqXfwI2V5LSi3hlx NGhA== X-Gm-Message-State: AOJu0Yy0PK5FqDesj2Za7uBWAOYwnEDlfRnZntdOfxSG3eb8kF5yADRV LYX2k0CaQarD2X4IbYYrrA3t7bKyv5d+kphRjSCwC+CpNuzIG0xRXUD5yhfkq8dQ2rky+MzK+hM EG+Dkl6advuu6piqLf65RhWMl02H1EivqoC3u3g2H6XRjH5k26X+IYUJJDkaV7fmStwuC7aPb/4 DVPg== X-Received: by 2002:a17:906:7f90:b0:a2c:3596:b0c1 with SMTP id f16-20020a1709067f9000b00a2c3596b0c1mr4985254ejr.75.1706542961640; Mon, 29 Jan 2024 07:42:41 -0800 (PST) X-Received: by 2002:a17:906:7f90:b0:a2c:3596:b0c1 with SMTP id f16-20020a1709067f9000b00a2c3596b0c1mr4985242ejr.75.1706542961322; Mon, 29 Jan 2024 07:42:41 -0800 (PST) Received: from amikhalitsyn ([91.64.72.41]) by smtp.gmail.com with ESMTPSA id fj18-20020a1709069c9200b00a3496fa1f7fsm4069969ejc.91.2024.01.29.07.42.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 29 Jan 2024 07:42:40 -0800 (PST) Date: Mon, 29 Jan 2024 16:42:40 +0100 From: Alexander Mikhalitsyn To: Christian Brauner Cc: mszeredi@redhat.com, stgraber@stgraber.org, linux-fsdevel@vger.kernel.org, Seth Forshee , Miklos Szeredi , Amir Goldstein , Bernd Schubert , linux-kernel@vger.kernel.org Subject: Re: [PATCH v1 4/9] fs/fuse: support idmapped getattr inode op Message-Id: <20240129164240.9e35bcf01695efcb1f966517@canonical.com> In-Reply-To: <20240120-heult-applaudieren-d6449392b497@brauner> References: <20240108120824.122178-1-aleksandr.mikhalitsyn@canonical.com> <20240108120824.122178-5-aleksandr.mikhalitsyn@canonical.com> <20240120-heult-applaudieren-d6449392b497@brauner> X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.33; x86_64-pc-linux-gnu) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Sat, 20 Jan 2024 16:21:08 +0100 Christian Brauner wrote: > > int fuse_update_attributes(struct inode *inode, struct file *file, u32 mask) > > { > > - return fuse_update_get_attr(inode, file, NULL, mask, 0); > > + return fuse_update_get_attr(&nop_mnt_idmap, inode, file, NULL, mask, 0); > > } > > > > int fuse_reverse_inval_entry(struct fuse_conn *fc, u64 parent_nodeid, > > @@ -1506,7 +1510,7 @@ static int fuse_perm_getattr(struct inode *inode, int mask) > > return -ECHILD; > > > > forget_all_cached_acls(inode); > > - return fuse_do_getattr(inode, NULL, NULL); > > + return fuse_do_getattr(&nop_mnt_idmap, inode, NULL, NULL); > > } > > > > /* > > @@ -2062,7 +2066,7 @@ static int fuse_setattr(struct mnt_idmap *idmap, struct dentry *entry, > > * ia_mode calculation may have used stale i_mode. > > * Refresh and recalculate. > > */ > > - ret = fuse_do_getattr(inode, NULL, file); > > + ret = fuse_do_getattr(&nop_mnt_idmap, inode, NULL, file); > > if (ret) > > return ret; > Hi, Christian! > These are internal getattr requests that don't originate from a specific mount? These requests do originate from a specific mount, but we don't need an idmapping in there because 3rd argument of fuse_do_getattr(struct mnt_idmap *idmap, struct inode *inode, struct kstat *stat, struct file *file) is NULL, which means that this request will not fill an stat structure => we don't need to take an idmapping into account. > Can you please add a comment about this in the commit message so it's > clear why it's ok to not pass the idmapping? Sure, that's my bad that I haven't added this explanation! It's not obvious at all. Will be fixed in -v2. Thanks, Alex