From nobody Thu May 2 13:18:53 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) client-ip=208.118.235.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org Return-Path: Received: from lists.gnu.org (lists.gnu.org [208.118.235.17]) by mx.zohomail.com with SMTPS id 1500632595393205.70963139370144; Fri, 21 Jul 2017 03:23:15 -0700 (PDT) Received: from localhost ([::1]:42148 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1dYV5V-0006KZ-Vd for importer@patchew.org; Fri, 21 Jul 2017 06:23:14 -0400 Received: from eggs.gnu.org ([2001:4830:134:3::10]:58267) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1dYV3Z-00054M-27 for qemu-devel@nongnu.org; Fri, 21 Jul 2017 06:21:14 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1dYV3Y-0006xr-1V for qemu-devel@nongnu.org; Fri, 21 Jul 2017 06:21:13 -0400 Received: from mx1.redhat.com ([209.132.183.28]:54200) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1dYV3V-0006vg-7L; Fri, 21 Jul 2017 06:21:09 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 32045883B4; Fri, 21 Jul 2017 10:21:08 +0000 (UTC) Received: from lemon.redhat.com (ovpn-12-28.pek2.redhat.com [10.72.12.28]) by smtp.corp.redhat.com (Postfix) with ESMTP id ECCB617AEC; Fri, 21 Jul 2017 10:21:04 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 32045883B4 Authentication-Results: ext-mx02.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx02.extmail.prod.ext.phx2.redhat.com; spf=pass smtp.mailfrom=famz@redhat.com DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.redhat.com 32045883B4 From: Fam Zheng To: qemu-devel@nongnu.org Date: Fri, 21 Jul 2017 18:20:58 +0800 Message-Id: <20170721102059.14663-2-famz@redhat.com> In-Reply-To: <20170721102059.14663-1-famz@redhat.com> References: <20170721102059.14663-1-famz@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Fri, 21 Jul 2017 10:21:08 +0000 (UTC) X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] [fuzzy] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH 1/2] osdep: Add runtime OFD lock detection X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Kevin Wolf , qemu-block@nongnu.org, jsnow@redhat.com, Andrew Baumann , Max Reitz Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail: RSF_0 Z_629925259 SPT_0 Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Build time check of OFD lock is not sufficient and can cause image open errors when the runtime environment doesn't support it. Add a helper function to probe it at runtime, additionally. Also provide a qemu_has_ofd_lock() for callers to check the status. Signed-off-by: Fam Zheng --- include/qemu/osdep.h | 1 + util/osdep.c | 72 +++++++++++++++++++++++++++++++++++++++++++++---= ---- 2 files changed, 64 insertions(+), 9 deletions(-) diff --git a/include/qemu/osdep.h b/include/qemu/osdep.h index 3b74f6fcb2..6855b94bbf 100644 --- a/include/qemu/osdep.h +++ b/include/qemu/osdep.h @@ -357,6 +357,7 @@ int qemu_dup(int fd); int qemu_lock_fd(int fd, int64_t start, int64_t len, bool exclusive); int qemu_unlock_fd(int fd, int64_t start, int64_t len); int qemu_lock_fd_test(int fd, int64_t start, int64_t len, bool exclusive); +bool qemu_has_ofd_lock(void); =20 #if defined(__HAIKU__) && defined(__i386__) #define FMT_pid "%ld" diff --git a/util/osdep.c b/util/osdep.c index a2863c8e53..b275c6579a 100644 --- a/util/osdep.c +++ b/util/osdep.c @@ -38,13 +38,8 @@ extern int madvise(caddr_t, size_t, int); #include "qemu/error-report.h" #include "monitor/monitor.h" =20 -#ifdef F_OFD_SETLK -#define QEMU_SETLK F_OFD_SETLK -#define QEMU_GETLK F_OFD_GETLK -#else -#define QEMU_SETLK F_SETLK -#define QEMU_GETLK F_GETLK -#endif +static int fcntl_op_setlk =3D -1; +static int fcntl_op_getlk =3D -1; =20 static bool fips_enabled =3D false; =20 @@ -149,6 +144,63 @@ static int qemu_parse_fdset(const char *param) return qemu_parse_fd(param); } =20 +static void qemu_probe_lock_ops(void) +{ + if (fcntl_op_setlk =3D=3D -1) { +#ifdef F_OFD_SETLK + int fd; + int ret; + const char *tmpdir; + char *filename; + struct flock fl =3D { + .l_whence =3D SEEK_SET, + .l_start =3D 0, + .l_len =3D 0, + .l_type =3D F_WRLCK, + }; + + tmpdir =3D getenv("TMPDIR"); + if (!tmpdir) { + tmpdir =3D "/var/tmp"; + } + filename =3D g_strdup_printf("%s/qemu_lock_probe.XXXXXX", tmpdir); + fd =3D mkstemp(filename); + if (fd < 0) { + fprintf(stderr, "Failed to create temporary file '%s': %s\n", + filename, strerror(errno)); + fcntl_op_setlk =3D F_SETLK; + fcntl_op_getlk =3D F_GETLK; + goto out; + } + ret =3D fcntl(fd, F_OFD_SETLK, &fl); + close(fd); + unlink(filename); + if (!ret) { + fcntl_op_setlk =3D F_OFD_SETLK; + fcntl_op_getlk =3D F_OFD_GETLK; + } else { + fcntl_op_setlk =3D F_SETLK; + fcntl_op_getlk =3D F_GETLK; + } +out: + g_free(filename); +#else + fcntl_op_setlk =3D F_SETLK; + fcntl_op_getlk =3D F_GETLK; +#endif + } +} + +bool qemu_has_ofd_lock(void) +{ + qemu_probe_lock_ops(); +#ifdef F_OFD_SETLK + return fcntl_op_setlk =3D=3D F_OFD_SETLK; +#else + return false; +#endif +} + static int qemu_lock_fcntl(int fd, int64_t start, int64_t len, int fl_type) { int ret; @@ -158,7 +210,8 @@ static int qemu_lock_fcntl(int fd, int64_t start, int64= _t len, int fl_type) .l_len =3D len, .l_type =3D fl_type, }; - ret =3D fcntl(fd, QEMU_SETLK, &fl); + qemu_probe_lock_ops(); + ret =3D fcntl(fd, fcntl_op_setlk, &fl); return ret =3D=3D -1 ? -errno : 0; } =20 @@ -181,7 +234,8 @@ int qemu_lock_fd_test(int fd, int64_t start, int64_t le= n, bool exclusive) .l_len =3D len, .l_type =3D exclusive ? F_WRLCK : F_RDLCK, }; - ret =3D fcntl(fd, QEMU_GETLK, &fl); + qemu_probe_lock_ops(); + ret =3D fcntl(fd, fcntl_op_getlk, &fl); if (ret =3D=3D -1) { return -errno; } else { --=20 2.13.3 From nobody Thu May 2 13:18:53 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) client-ip=208.118.235.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org Return-Path: Received: from lists.gnu.org (lists.gnu.org [208.118.235.17]) by mx.zohomail.com with SMTPS id 1500632591295308.9345028355232; Fri, 21 Jul 2017 03:23:11 -0700 (PDT) Received: from localhost ([::1]:42147 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1dYV5O-0006Ek-Nz for importer@patchew.org; Fri, 21 Jul 2017 06:23:06 -0400 Received: from eggs.gnu.org ([2001:4830:134:3::10]:58289) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1dYV3b-00057F-8V for qemu-devel@nongnu.org; Fri, 21 Jul 2017 06:21:16 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1dYV3a-00070D-90 for qemu-devel@nongnu.org; Fri, 21 Jul 2017 06:21:15 -0400 Received: from mx1.redhat.com ([209.132.183.28]:56640) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1dYV3X-0006wg-Vg; Fri, 21 Jul 2017 06:21:12 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 08E9152748; Fri, 21 Jul 2017 10:21:11 +0000 (UTC) Received: from lemon.redhat.com (ovpn-12-28.pek2.redhat.com [10.72.12.28]) by smtp.corp.redhat.com (Postfix) with ESMTP id B63128B30B; Fri, 21 Jul 2017 10:21:08 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 08E9152748 Authentication-Results: ext-mx05.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx05.extmail.prod.ext.phx2.redhat.com; spf=pass smtp.mailfrom=famz@redhat.com DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.redhat.com 08E9152748 From: Fam Zheng To: qemu-devel@nongnu.org Date: Fri, 21 Jul 2017 18:20:59 +0800 Message-Id: <20170721102059.14663-3-famz@redhat.com> In-Reply-To: <20170721102059.14663-1-famz@redhat.com> References: <20170721102059.14663-1-famz@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.29]); Fri, 21 Jul 2017 10:21:11 +0000 (UTC) X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] [fuzzy] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH 2/2] file-posix: Do runtime check for ofd lock API X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Kevin Wolf , qemu-block@nongnu.org, jsnow@redhat.com, Andrew Baumann , Max Reitz Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail: RSF_0 Z_629925259 SPT_0 Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" It is reported that on Windows Subsystem for Linux, ofd operations fail with -EINVAL. In other words, QEMU binary built with system headers that exports F_OFD_SETLK doesn't necessarily run in an environment that actually supports it: $ qemu-system-aarch64 ... -drive file=3Dtest.vhdx,if=3Dnone,id=3Dhd0 \ -device virtio-blk-pci,drive=3Dhd0 qemu-system-aarch64: -drive file=3Dtest.vhdx,if=3Dnone,id=3Dhd0: Failed to = unlock byte 100 qemu-system-aarch64: -drive file=3Dtest.vhdx,if=3Dnone,id=3Dhd0: Failed to = unlock byte 100 qemu-system-aarch64: -drive file=3Dtest.vhdx,if=3Dnone,id=3Dhd0: Failed to = lock byte 100 Let's do a runtime check to cope with that. Reported-by: Andrew Baumann Signed-off-by: Fam Zheng Reviewed-by: Eric Blake Tested-By: Andrew Baumann --- block/file-posix.c | 19 ++++++++----------- 1 file changed, 8 insertions(+), 11 deletions(-) diff --git a/block/file-posix.c b/block/file-posix.c index cfbb236f6f..5ddf2729eb 100644 --- a/block/file-posix.c +++ b/block/file-posix.c @@ -457,22 +457,19 @@ static int raw_open_common(BlockDriverState *bs, QDic= t *options, switch (locking) { case ON_OFF_AUTO_ON: s->use_lock =3D true; -#ifndef F_OFD_SETLK - fprintf(stderr, - "File lock requested but OFD locking syscall is unavailabl= e, " - "falling back to POSIX file locks.\n" - "Due to the implementation, locks can be lost unexpectedly= .\n"); -#endif + if (!qemu_has_ofd_lock()) { + fprintf(stderr, + "File lock requested but OFD locking syscall is " + "unavailable, falling back to POSIX file locks.\n" + "Due to the implementation, locks can be lost " + "unexpectedly.\n"); + } break; case ON_OFF_AUTO_OFF: s->use_lock =3D false; break; case ON_OFF_AUTO_AUTO: -#ifdef F_OFD_SETLK - s->use_lock =3D true; -#else - s->use_lock =3D false; -#endif + s->use_lock =3D qemu_has_ofd_lock(); break; default: abort(); --=20 2.13.3