Received: by 2002:a05:7412:251c:b0:e2:908c:2ebd with SMTP id w28csp2490562rda; Wed, 25 Oct 2023 04:31:12 -0700 (PDT) X-Google-Smtp-Source: AGHT+IETmnr6OsAKumxsY4OmLOKegS7iVN3Zm3FlwY4tNiJYTzHXAFlcLDp7NAFn0OnWp1DAIQd6 X-Received: by 2002:ac8:580c:0:b0:412:2f98:2b9b with SMTP id g12-20020ac8580c000000b004122f982b9bmr18447257qtg.8.1698233472017; Wed, 25 Oct 2023 04:31:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698233472; cv=none; d=google.com; s=arc-20160816; b=mh2Cn+OSEPRb99Ej0TumUNoknu4291/9ea/ncBLvl4ZAKskH+FsOyE0gmjEdlIOBJR z4g8UsP79p/wtYrlfu0w3bz+coVhCxcn3EL83MF22bcY7b4Co859pXyIXzrYBLAAIkKB EzugxrgH0mU3OaLJQt9khiS2QSzXOZrHrfwqWCbldK1YMD1OCAQKj0c/Fk4TMgXotnyo W14mASv/2bK0HF9qnEchx9LkRYcyn47i7Gz6hlfTv1+V9CVoubO7zhIqBTBnWcfCnfbT cM/IFzInZKBon2xZs+4OOag0RrIqtJdm9agR2/UpaSOY0nDRm0TaRdScqqw/cvArXCei GtDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:reply-to:user-agent :mime-version:date:message-id; bh=2z8YlFMlEKuyIeumJjimh4CmBkBWnQjxUtFo3fK7BhY=; fh=HSXNEsNDwnKMXKH24NqXqFh1tsR/+YP+A5jF3+c+4ko=; b=kwyolWuCHfZ6GI7aCxXVlQRMOSYd2TeyRjAyPILc7u/reqDE916bca0UlHDt7dAP5f Ud5N3XTU07P1xWLwrMbMHRl8/PjafY3tIUoD1FOw4CaJLK58Ou2qknHR693opEFgj8so bOGoKxHwGGTtnE7SyPJ2Bkp8JyLu5QFowQ3pF29bwxSC4h9vxqt85KCBft/D4QQBFgVR nqYRtbsyZ1SuAgOBINq+rOZWSR8nSBvJ8A9Jo3KuBuLnCD23NpHxnvybOFWxAlispHky vz1r7B7Vf69/nwEuMEvzietzS05U75/MrWXBEVXT4WY5TmtGuIh3sYR0Pgt6vwtUPlvP QM6w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from morse.vger.email (morse.vger.email. [23.128.96.31]) by mx.google.com with ESMTPS id t7-20020a05622a01c700b004198727ea19si8339055qtw.528.2023.10.25.04.31.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 25 Oct 2023 04:31:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) client-ip=23.128.96.31; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id 5467B809DE7B; Wed, 25 Oct 2023 04:30:20 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234378AbjJYLaM (ORCPT + 99 others); Wed, 25 Oct 2023 07:30:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40110 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234598AbjJYLaK (ORCPT ); Wed, 25 Oct 2023 07:30:10 -0400 Received: from wp530.webpack.hosteurope.de (wp530.webpack.hosteurope.de [80.237.130.52]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CDC88130; Wed, 25 Oct 2023 04:30:07 -0700 (PDT) Received: from [2a02:8108:8980:2478:8cde:aa2c:f324:937e]; authenticated by wp530.webpack.hosteurope.de running ExIM with esmtpsa (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) id 1qvc5N-00084y-OX; Wed, 25 Oct 2023 13:30:05 +0200 Message-ID: <8ae8ce4d-6323-4160-848a-5e94895ae60e@leemhuis.info> Date: Wed, 25 Oct 2023 13:30:04 +0200 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Reply-To: Linux regressions mailing list Subject: Re: [PATCH v2] Revert "fuse: Apply flags2 only when userspace set the FUSE_INIT_EXT" Content-Language: en-US, de-DE To: Miklos Szeredi Cc: "stable@vger.kernel.org" , Greg Kroah-Hartman , "linux-kernel@vger.kernel.org" , Paul Lawrence , Daniel Rosenberg , Alessio Balsini , Amir Goldstein , Bernd Schubert , =?UTF-8?Q?Andr=C3=A9_Draszik?= References: <20230904133321.104584-1-git@andred.net> <20231018111508.3913860-1-git@andred.net> <717fd97a-6d14-4dc9-808c-d752d718fb80@ddn.com> <4b0b46f29955956916765d8d615f96849c8ce3f7.camel@linaro.org> <1b03f355170333f20ee20e47c5f355dc73d3a91c.camel@linaro.org> <9afc3152-5448-42eb-a7f4-4167fc8bc589@ddn.com> <5cd87a64-c506-46f2-9fed-ac8a74658631@ddn.com> From: "Linux regression tracking (Thorsten Leemhuis)" In-Reply-To: <5cd87a64-c506-46f2-9fed-ac8a74658631@ddn.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-bounce-key: webpack.hosteurope.de;regressions@leemhuis.info;1698233407;c10736fc; X-HE-SMSGID: 1qvc5N-00084y-OX X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Wed, 25 Oct 2023 04:30:20 -0700 (PDT) Hi, Thorsten here, the Linux kernel's regression tracker. Top-posting for once, to make this easily accessible to everyone. Miklos, I'm wondering what the status here is. The description in the reverts André sent[1] are maybe a bit vague[2], but it sounds a lot like he ran into a big regression that should be addressed somehow -- maybe with a revert. But it seems we haven't got any closer to that in all those ~7 weeks since the first revert was posted. But I might be missing something, hence a quick evaluation from your side would help me a lot here to understand the situation. [1] https://lore.kernel.org/lkml/20230904133321.104584-1-git@andred.net/ https://lore.kernel.org/lkml/20231018111508.3913860-1-git@andred.net/ [2] Does this happen on all Android versions or just some? And what is actually breaking (this was answered somewhere in the thread iirc)? Ciao, Thorsten (wearing his 'the Linux kernel's regression tracker' hat) -- Everything you wanna know about Linux kernel regression tracking: https://linux-regtracking.leemhuis.info/about/#tldr If I did something stupid, please tell me, as explained on that page. On 18.10.23 17:51, Bernd Schubert wrote: > On 10/18/23 16:40, Bernd Schubert wrote: >> On 10/18/23 16:26, André Draszik wrote: >>> On Wed, 2023-10-18 at 11:52 +0000, Bernd Schubert wrote: >>>> On 10/18/23 13:46, André Draszik wrote: >>>>> On Wed, 2023-10-18 at 11:39 +0000, Bernd Schubert wrote: >>>>>> On 10/18/23 13:15, André Draszik wrote: >>>>>>> From: André Draszik >>>>>>> >>>>>>> This reverts commit 3066ff93476c35679cb07a97cce37d9bb07632ff. >>>>>>> >>>>>>> This patch breaks all existing userspace by requiring updates >>>>>>> as >>>>>>> mentioned in the commit message, which is not allowed. >>>>>>> >>>>>>> Revert to restore compatibility with existing userspace >>>>>>> implementations. >>>>>> >>>>>> Which fuse file system does it exactly break? In fact there >>>>>> haven't >>>>>> been >>>>>> added too many flags after - what exactly is broken? >>>>> >>>>> The original patch broke the existing kernel <-> user ABI by now >>>>> requiring user space applications to pass in an extra flag. >>>>> There are various side-effects of this, like unbootable systems, >>>>> just >>>>> because the kernel was updated. >>>>> Breaking the ABI is the one thing that is not allowed. This is not >>>>> specific to any particular fuse file system. >>>> >>>> How exactly did it break it? >>> >>> At least in Android, creating new files, or reading existing files >>> returns -EFAULT >> >> Hmm, could you please point me to the corresponding android userspace >> library? I guess it is not using libfuse? At least I would like to >> understand the issue... >> >>> >>>>   These are feature flags - is there really a >>>> file system that relies on these flag to the extend that it does not >>>> work anymore? >>> >>> I don't know enough about the implementation details, but even outside >>> Android user space had to be updated as a prerequisite for this kernel >>> patch: >>> https://lore.kernel.org/all/YmUKZQKNAGimupv7@redhat.com/ >>> https://github.com/libfuse/libfuse/pull/662 >>> >>> Which means any non-Android user space predating those changes isn't >>> working anymore either. >> >> The patch in libfuse is from me, there was nothing broken. >> And I don't think that any of the additional flags added are a >> _requirement_ for libfuse file systems to work. I'm not sure if DAX and >> the other flags before the patch was merged are a _requirement_ for >> virtiofsd or just a nice feature to have... > > > Looking at the android kernel source: > > /* > * For FUSE < 7.36 FUSE_PASSTHROUGH has value (1 << 31). > * This condition check is not really required, but would prevent having a > * broken commit in the tree. > */ > #if FUSE_KERNEL_VERSION > 7 || \ > (FUSE_KERNEL_VERSION == 7 && FUSE_KERNEL_MINOR_VERSION >= 36) > #define FUSE_PASSTHROUGH (1ULL << 63) > #else > #define FUSE_PASSTHROUGH (1 << 31) > #endif > > > So passthrough gets broken with this check and android heavily uses that. > Would be interesting to know if this could result in EFAULT. > > > Thanks, > Bernd