Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp2194900imm; Thu, 18 Oct 2018 10:29:06 -0700 (PDT) X-Google-Smtp-Source: ACcGV63TA1LlJrQhZ3YJAi/N2oDLLaJPwfWVDcHoabjBsPoKyQg31W14ghJ5bv/Zvvr11zEOyxb8 X-Received: by 2002:a63:8f09:: with SMTP id n9-v6mr28931111pgd.222.1539883746932; Thu, 18 Oct 2018 10:29:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539883746; cv=none; d=google.com; s=arc-20160816; b=gQ7eREAhOJarpF/WGnKzcmxGyDi9ROurgmPJREzIrsg4rozf3X2EK5X6qPxEwaJZri HhL04g0th8Api1hWxzGHsV+gl0dz9JIZEIMom4x7vYqbIoTpTtqVOtRBCwN/KsQdakKU 2VyVaSzuHLUNy1f2mQLKbFkZutrxtjgkj12FZNeNsuSrtkMCTutCPAHozDmX9y0sSKUC uUAhMIgHHN04qpTnR7TyXORzWuENevcM+o2x67SlHxK5/a4FVE2R6QGqzjKL7LlUxGDA ecifN3TFYWYEDRJI+D4mqvfLwnY4+fA2bIA7aPvVRKb79uhskOVRA/0ewuUe/ujLCqGM RZ+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=2AiRBIYNt9gJLV17pApdX2NjT2L9+5+bjKdCL3LusCQ=; b=cKsRGpmJLgLbdUB8M8SkL4RRkh8iaEjGfu7pGtQzY5ppXzB7R3I1teTart63KaM4JV z3cioO28C5BUK2V0kMNJlUseZjrga4CaVxSVpuqa37YBs6DstbOJ9K1nHXqCMwySmekW 0kVndhU3/5Uw3dq8smHJ/78cVpy+79UKkVkj43c8h4JhXL4sOHjcNKN7t7pywts/FnG6 qz6P9PWbpEGEAxCC4wKzeQZ0p9k/fS8gzb+KPIdnUPEPcC1ZKK5W5Vxu8sNqE0Qy1E7g Cg/1Dki1r9kiMUncCi/LqesfjlgwKWPBc4Wm8yF6IW+d/HOeMHoTI2eiLWm/rvE9O2sh +d9Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TSWkZd5+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v4-v6si20082253plp.247.2018.10.18.10.28.51; Thu, 18 Oct 2018 10:29:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TSWkZd5+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728457AbeJSB2c (ORCPT + 99 others); Thu, 18 Oct 2018 21:28:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:41714 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728331AbeJSB2c (ORCPT ); Thu, 18 Oct 2018 21:28:32 -0400 Received: from mail-wr1-f44.google.com (mail-wr1-f44.google.com [209.85.221.44]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9FB2A214FA for ; Thu, 18 Oct 2018 17:26:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1539883593; bh=e16kwM7hrBmJthwN/t+6Uv/0dFgLE1LBs9brtKNztEI=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=TSWkZd5+G3V+EURqLVW3lmKA6D2qVg5D5NeoHBDdZRvyNtsphkoeSp7IMKAsfDnq7 +9hBU3YFJA8k6ltA35K2x/kbXd+c7S7UwGsDMd9L7VAqkO7zp0qwIJaxWgsymi/Mqf tLgifoXhHJ2iyJ7ocYYXf2W/RLaZBn5LhTJxqNo8= Received: by mail-wr1-f44.google.com with SMTP id a13-v6so34580619wrt.5 for ; Thu, 18 Oct 2018 10:26:33 -0700 (PDT) X-Gm-Message-State: AGRZ1gJxhVA+7WSaTyaM2EJbyAJKb34C9xM/AlRbrKZ/ezyoXNhE9d95 S9dLLjmbJ8sOIpDGYMDb1RLfZsrQHSE60n9/iCqn0Q== X-Received: by 2002:adf:82c2:: with SMTP id 60-v6mr3498326wrc.131.1539883591969; Thu, 18 Oct 2018 10:26:31 -0700 (PDT) MIME-Version: 1.0 References: <1460987025-30360-1-git-send-email-dsafonov@virtuozzo.com> <87h8hkc9fd.fsf@notabene.neil.brown.name> <871s8ndg6a.fsf@notabene.neil.brown.name> In-Reply-To: <871s8ndg6a.fsf@notabene.neil.brown.name> From: Andy Lutomirski Date: Thu, 18 Oct 2018 10:26:20 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: in_compat_syscall() returns from kernel thread for X86_32. To: NeilBrown , "Ted Ts'o" , Andreas Dilger Cc: Peter Zijlstra , Dmitry Safonov , Andrew Lutomirski , "H. Peter Anvin" , Denys Vlasenko , Linus Torvalds , Borislav Petkov , Ingo Molnar , Brian Gerst , LKML , Thomas Gleixner , linux-tip-commits@vger.kernel.org, jsimmons@infradead.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Oct 17, 2018 at 9:36 PM NeilBrown wrote: > > On Wed, Oct 17 2018, Andy Lutomirski wrote: > > > On Wed, Oct 17, 2018 at 6:48 PM NeilBrown wrote: > >> > >> > >> Was: Re: [tip:x86/asm] x86/entry: Rename is_{ia32,x32}_task() to in_{ia32,x32}_syscall() > >> On Tue, Apr 19 2016, tip-bot for Dmitry Safonov wrote: > >> > >> > Commit-ID: abfb9498ee1327f534df92a7ecaea81a85913bae > >> > Gitweb: http://git.kernel.org/tip/abfb9498ee1327f534df92a7ecaea81a85913bae > >> > Author: Dmitry Safonov > >> > AuthorDate: Mon, 18 Apr 2016 16:43:43 +0300 > >> > Committer: Ingo Molnar > >> > CommitDate: Tue, 19 Apr 2016 10:44:52 +0200 > >> > > >> > x86/entry: Rename is_{ia32,x32}_task() to in_{ia32,x32}_syscall() > >> > > >> ... > >> > @@ -318,7 +318,7 @@ static inline bool is_x32_task(void) > >> > > >> > static inline bool in_compat_syscall(void) > >> > { > >> > - return is_ia32_task() || is_x32_task(); > >> > + return in_ia32_syscall() || in_x32_syscall(); > >> > } > >> > >> Hi, > >> I'm reply to this patch largely to make sure I get the right people > >> ..... > >> > >> This test is always true when CONFIG_X86_32 is set, as that forces > >> in_ia32_syscall() to true. > >> However we might not be in a syscall at all - we might be running a > >> kernel thread which is always in 64 mode. > >> Every other implementation of in_compat_syscall() that I found is > >> dependant on a thread flag or syscall register flag, and so returns > >> "false" in a kernel thread. > >> > >> Might something like this be appropriate? > >> > >> diff --git a/arch/x86/include/asm/thread_info.h b/arch/x86/include/asm/thread_info.h > >> index 2ff2a30a264f..c265b40a78f2 100644 > >> --- a/arch/x86/include/asm/thread_info.h > >> +++ b/arch/x86/include/asm/thread_info.h > >> @@ -219,7 +219,7 @@ static inline int arch_within_stack_frames(const void * const stack, > >> #ifndef __ASSEMBLY__ > >> > >> #ifdef CONFIG_X86_32 > >> -#define in_ia32_syscall() true > >> +#define in_ia32_syscall() (!(current->flags & PF_KTHREAD)) > >> #else > >> #define in_ia32_syscall() (IS_ENABLED(CONFIG_IA32_EMULATION) && \ > >> current_thread_info()->status & TS_COMPAT) > >> > >> This came up in the (no out-of-tree) lustre filesystem where some code > >> needs to assume 32-bit mode in X86_32 syscalls, and 64-bit mode in kernel > >> threads. > >> > > > > I could get on board with: > > > > ({WARN_ON_ONCE(current->flags & PF_KTHREAD); true}) > > > > The point of these accessors is to be used *in a syscall*. > > > > What on Earth is Lustre doing that makes it have this problem? > > Lustre uses it in the ->getattr method to make sure ->ino, ->dev and > ->rdev are appropriately sized. This isn't very different from the > usage in ext4 to ensure the seek offset for directories is suitable. > > These interfaces can be used both from systemcalls and from kernel > threads, such as via nfsd. > > I don't *know* if nfsd is the particular kthread that causes problems > for lustre. All I know is that ->getattr returns 32bit squashed inode > numbers in kthread context where 64 bit numbers would be expected. > Well, that looks like Lustre is copying an ext4 bug. Hi ext4 people- ext4's is_32bit_api() function is bogus. You can't use in_compat_syscall() unless you know you're in a syscall The buggy code was introduced in: commit d1f5273e9adb40724a85272f248f210dc4ce919a Author: Fan Yong Date: Sun Mar 18 22:44:40 2012 -0400 ext4: return 32/64-bit dir name hash according to usage type I don't know what the right solution is. Al, is it legit at all for fops->llseek to care about the caller's bitness? If what ext4 is doing is legit, then ISTM the VFS needs to gain a new API to tell ->llseek what to do. But I'm wondering why FMODE_64BITHASH by itself isn't sufficient, I'm quite tempted to add a warning to the x86 arch code to try to catch this type of bug. Fortunately, a bit of grepping suggests that ext4 is the only filesystem with this problem. --Andy