Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp3527295ybz; Mon, 20 Apr 2020 04:41:14 -0700 (PDT) X-Google-Smtp-Source: APiQypJz5mj4A49+wfSvMzzStMgxbGXv9o0KKOX5QPsvAa6kEMhMrEgBfsXdV5MEJHj7HzButxJm X-Received: by 2002:a17:906:2ad4:: with SMTP id m20mr16474881eje.324.1587382874601; Mon, 20 Apr 2020 04:41:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587382874; cv=none; d=google.com; s=arc-20160816; b=iSmsvOGd6EMApCDfMufzzYEEUPj7OpiaOVSED30qocW7PdEWKTGK/OPmLQlg0TcLjT QCDGEo4koiIEaCBy2p+hCUFI/KH2ksyEgM5EpODGdgUpyI5n4mDJH4Dl2ctr4m6ML5Ug 8a+b6FJPYOOeubTiOnaBCPfihSSYm1lIIIukepmyDXe0ZuIa0gVXOs8sOs9+BwS0Beib 1E5N+v03pmwXwcInuyJW78DaKje0GzfDG5+SSSJlwmaEDs1HcDygvPLqLiN/HkYOKRuE 9jjyz6fnoHc+dE4+VF55g7VZ0j/Z7f5OX6U83NgG8b3STHLInFN6By1yQS2CKUbAIrgC QVWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=DS+SwsiiAa2IC1Of+N2xMxxQ2Qn8OB6+yF3JDFdmUGw=; b=1K+SST7h/Ifw39e2/t/1eQCO7/mHfRGe1plW4Moz0TYXNTbd99aqBYc2m1e/Ifzk3f WL5YYc1I2rbSBmcBwdBDj5CBK15nfRQ8CgJlQQwcr3n8o8C/1I6h+TPRW6y5vhm7kS1D JgQ9WYujSnyupfF3SpbF6EXPrqedlepsZpJw3m+ZHgcuoo4QkrEX8AP+sbU7bmiVAq9x Tg4H2eh6xsl9fIXkyztdtWw06M0uOlRN2dCS8kS20fM8WNYJ7Q5Buy2vJWnIiXG3SMTg 0++8/7w0nmn+y3A8ZJcxK1yv84Jr8wYgqC67x2zPaL5h8336HxyiUsw7MxtJeLtGKYS6 0qCA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=LbETIOvY; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gs25si393186ejb.366.2020.04.20.04.40.45; Mon, 20 Apr 2020 04:41:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=LbETIOvY; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726399AbgDTLi6 (ORCPT + 99 others); Mon, 20 Apr 2020 07:38:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51172 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1726405AbgDTLi5 (ORCPT ); Mon, 20 Apr 2020 07:38:57 -0400 Received: from mail-ot1-x343.google.com (mail-ot1-x343.google.com [IPv6:2607:f8b0:4864:20::343]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4AA5BC061A10 for ; Mon, 20 Apr 2020 04:38:56 -0700 (PDT) Received: by mail-ot1-x343.google.com with SMTP id j4so7735211otr.11 for ; Mon, 20 Apr 2020 04:38:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=DS+SwsiiAa2IC1Of+N2xMxxQ2Qn8OB6+yF3JDFdmUGw=; b=LbETIOvYzs18kn6+m0ic3svL2kvhfMXbxm1qMe2vEGt8OHLOrYNVoOwsPuWgg4CsEE A8el+FMXMV/XtEtPGn+tQ1aP0cH4rGdrv630f1UeTl/AkMPBkxD6aPck93ucdsf3wnWi 9yudlhuklmM+m6OOvDu+phCj/Wf54YUcLAmJzVoCgrmRvxzrI6md1wsdYhfo/wVytYu/ /l6e+DaDbmIvST2a/+i1wiQtKF3W3h0OTCebZPJMuNVzyqGP+b9kxvau7dxTFV1va5NB RxRbYbYxI/Q/Heip8U6dWfx90Q7OyVoJYUg/b6/N33nMFAWgAJgZYYppzcAsVQS9re+/ lxYg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=DS+SwsiiAa2IC1Of+N2xMxxQ2Qn8OB6+yF3JDFdmUGw=; b=KtmLgN0xyoeA1HjWuMiAXqckT+JVlCOUIBnchmZv4WD1SiAxQ3+k+J9rHKvQB/6X+l IrGs1KY4JJqJCc5FCKuUzooUZVguAmBb8AKjrEkPOvYb+Tm2fA5/AuB1RJp8PGfMNW/s 9DwbHaHD6Ry93Vwg/MTvcJjkZIattm9E5ct11MAaKDtj3Vg3IAJ1o12CYxbnsk54Hx7S Xsp/jGpK/xdQvlMa4MyUqyGMkIB+GL3SC0l3D3NZgF1byMCsaKa42jkA46ZlOQsgFPxT 641mXbYee1Ir9wcQYtFdyZmeiJLfcpxlDuE14pyZatn0lzpb7nAU6QMN9mlGeIvWYhgb 2vVQ== X-Gm-Message-State: AGi0PuYV4kuBr5Qdk3FTNTbn1CSzECucA5uWV5lJkfe8AIRquKHJj+86 L1Cw9R1PInsaN2fhE4kEKlQYBaUmh1WUzIeouI4KxiE+KJiQxg== X-Received: by 2002:a05:6830:22dc:: with SMTP id q28mr8717028otc.221.1587382735551; Mon, 20 Apr 2020 04:38:55 -0700 (PDT) MIME-Version: 1.0 References: <20200331133536.3328-1-linus.walleij@linaro.org> <87v9luwgc6.fsf@mid.deneb.enyo.de> In-Reply-To: <87v9luwgc6.fsf@mid.deneb.enyo.de> From: Peter Maydell Date: Mon, 20 Apr 2020 12:38:44 +0100 Message-ID: Subject: Re: [PATCH] fcntl: Add 32bit filesystem mode To: Florian Weimer Cc: Linus Walleij , "Theodore Ts'o" , Andreas Dilger , Ext4 Developers List , linux-fsdevel , Linux API , QEMU Developers , Andy Lutomirski Content-Type: text/plain; charset="UTF-8" Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Mon, 20 Apr 2020 at 12:23, Florian Weimer wrote: > > * Peter Maydell: > > > We open fd 3 to read '.'; we issue the new fcntl, which > > succeeds. Then there's some unrelated stuff operating on > > stdout. Then we do a getdents64(), but the d_off values > > we get back are still 64 bits. The guest binary doesn't > > like those, so it fails. My expectation was that we would > > get back d_off values here that were in the 32 bit range. > > What's your file system? > > I think not all of them have 32-bit hashes (some of them probably > can't, particularly in the network-based file system case). Whoops, good point. I was testing this via lkvm, so it's actually using a 9p filesystem... I'll see if I can figure out how to test with an ext3 fs, which I think is the one we most care about. It would be nice if the flag was supported by other fses too, of course. Appended is the QEMU patch I tested with. thanks -- PMM From 73471e01733dd1d998ff3cd41edebb4c78793193 Mon Sep 17 00:00:00 2001 From: Peter Maydell Date: Mon, 20 Apr 2020 11:54:22 +0100 Subject: [RFC] linux-user: Use new F_SET_FILE_32BIT_FS fcntl for 32-bit guests If the guest is 32 bit then there is a potential problem if the host gives us back a 64-bit sized value that we can't fit into the ABI the guest requires. This is a theoretical issue for many syscalls, but a real issue for directory reads where the host is using ext3 or ext4. There the 'offset' values retured via the getdents syscall are hashes, and on a 64-bit system they will always fill the full 64 bits. Use the F_SET_FILE_32BIT_FS fcntl to tell the kernel to stick to 32-bit sized hashes for fds used by the guest. Signed-off-by: Peter Maydell --- RFC patch because it depends on the kernel patch to provide F_SET_FILE_32BIT_FS, which is still under discussion. All this patch does is call the fcntl for every fd the guest opens. linux-user/syscall.c | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) diff --git a/linux-user/syscall.c b/linux-user/syscall.c index 674f70e70a5..8966d4881bd 100644 --- a/linux-user/syscall.c +++ b/linux-user/syscall.c @@ -884,6 +884,28 @@ static inline int host_to_target_sock_type(int host_type) return target_type; } +/* + * If the guest is using a 32 bit ABI then we should try to ask the kernel + * to provide 32-bit offsets in getdents syscalls, as otherwise some + * filesystems will return 64-bit hash values which we can't fit into + * the field sizes the guest ABI mandates. + */ +#ifndef F_SET_FILE_32BIT_FS +#define F_SET_FILE_32BIT_FS (1024 + 15) +#endif + +static inline void request_32bit_fs(int fd) +{ +#if HOST_LONG_BITS > TARGET_ABI_BITS + /* + * Ignore errors, which are likely due to the host kernel being too + * old to support this fcntl. We'll try anyway, which might or might + * not work, depending on the guest code and on the host filesystem. + */ + fcntl(fd, F_SET_FILE_32BIT_FS); +#endif +} + static abi_ulong target_brk; static abi_ulong target_original_brk; static abi_ulong brk_page; @@ -7704,6 +7726,7 @@ static abi_long do_syscall1(void *cpu_env, int num, abi_long arg1, target_to_host_bitmask(arg2, fcntl_flags_tbl), arg3)); fd_trans_unregister(ret); + request_32bit_fs(ret); unlock_user(p, arg1, 0); return ret; #endif @@ -7714,6 +7737,7 @@ static abi_long do_syscall1(void *cpu_env, int num, abi_long arg1, target_to_host_bitmask(arg3, fcntl_flags_tbl), arg4)); fd_trans_unregister(ret); + request_32bit_fs(ret); unlock_user(p, arg2, 0); return ret; #if defined(TARGET_NR_name_to_handle_at) && defined(CONFIG_OPEN_BY_HANDLE) @@ -7725,6 +7749,7 @@ static abi_long do_syscall1(void *cpu_env, int num, abi_long arg1, case TARGET_NR_open_by_handle_at: ret = do_open_by_handle_at(arg1, arg2, arg3); fd_trans_unregister(ret); + request_32bit_fs(ret); return ret; #endif case TARGET_NR_close: @@ -7769,6 +7794,7 @@ static abi_long do_syscall1(void *cpu_env, int num, abi_long arg1, return -TARGET_EFAULT; ret = get_errno(creat(p, arg2)); fd_trans_unregister(ret); + request_32bit_fs(ret); unlock_user(p, arg1, 0); return ret; #endif @@ -12393,6 +12419,7 @@ static abi_long do_syscall1(void *cpu_env, int num, abi_long arg1, } ret = get_errno(memfd_create(p, arg2)); fd_trans_unregister(ret); + request_32bit_fs(ret); unlock_user(p, arg1, 0); return ret; #endif -- 2.20.1