it seems similar to the exiting behavior when openat()
is called with a dirfd to "/proc". Here too the fake file lookup
may not catch the special file because no dirfd is used to
determine if the path is in /proc.
Signed-off-by: Michael Vogt
Buglink: https://github.com/osbuild/bootc-image
itialization of open_how
- Define target_open_how with abi_* types
- Warn about unimplemented size if "size" of openat2 is bigger than
target_open_how
Michael Vogt (2):
linux-user: add openat2 support in linux-user
linux-user: add strace support for openat2
linux-us
`syscall_defs.h` so that strace.c can use
them.
Signed-off-by: Michael Vogt
---
linux-user/qemu.h | 9
linux-user/strace.c | 44 +++
linux-user/strace.list| 3 +++
linux-user/syscall.c | 8 +--
linux-user/syscall_defs.h
`syscall_defs.h` so that strace.c can use
them.
Signed-off-by: Michael Vogt
---
linux-user/qemu.h | 9 +
linux-user/strace.c | 40 +++
linux-user/strace.list| 3 +++
linux-user/syscall.c | 8 +---
linux-user/syscall_defs.h
Define target_open_how with abi_* types
- Warn about unimplemented size if "size" of openat2 is bigger than
target_open_how
Michael Vogt (2):
linux-user: add openat2 support in linux-user
linux-user: add strace support for openat2
linux-user/qemu
it seems similar to the exiting behavior when openat()
is called with a dirfd to "/proc". Here too the fake file lookup
may not catch the special file because no dirfd is used to
determine if the path is in /proc.
Signed-off-by: Michael Vogt
Buglink: https://github.com/osbuild/bootc-image
`syscall_defs.h` so that strace.c can use
them.
Signed-off-by: Michael Vogt
---
linux-user/qemu.h | 9 +
linux-user/strace.c | 40 +++
linux-user/strace.list| 3 +++
linux-user/syscall.c | 8 +---
linux-user/syscall_defs.h
it seems similar to the exiting behavior when openat()
is called with a dirfd to "/proc". Here too the fake file lookup
may not catch the special file because no dirfd is used to
determine if the path is in /proc.
Signed-off-by: Michael Vogt
Buglink: https://github.com/osbuild/bootc-image
ser_unlock* if a lock call fails
- Fix silly incorrect use of "target_open_how" when "open_how" is required
- Fix coding style comments
- Fix validation of arg4 in openat2
- Fix missing zero initialization of open_how
- Define target_open_how with abi_* types
- Warn about
)" is used to
determine if the path is in /proc. Alternatively to ignoring
we could simply fail with `-TARGET_ENOSYS` (or similar) if
`resolve` flags are passed and we found something that looks
like a file in /proc that needs faking.
Signed-off-by: Michael Vogt
Buglink: https://github.co
ect use of "target_open_how" when "open_how" is required
- Fix coding style comments
- Fix validation of arg4 in openat2
- Fix missing zero initialization of open_how
- Define target_open_how with abi_* types
- Warn about unimplemented size if "size" of openat2 is bigge
)" is used to
determine if the path is in /proc. Alternatively to ignoring
we could simply fail with `-TARGET_ENOSYS` (or similar) if
`resolve` flags are passed and we found something that looks
like a file in /proc that needs faking.
Signed-off-by: Michael Vogt
Buglink: https://github.co
pen_how with abi_* types
- Warn about unimplemented size if "size" of openat2 is bigger than
target_open_how
Michael Vogt (1):
linux-user: add openat2 support in linux-user
linux-user/syscall.c | 107 +-
linux-user/syscall_defs.h | 7 +++
2 files changed, 112 insertions(+), 2 deletions(-)
--
2.45.2
friendly ping (see also
https://patchew.org/QEMU/cover.1725607795.git.mv...@redhat.com/)
Please let me know if there is anything I can do to make this easier to
review or if I should split or help otherwise.
On Fri, Sep 6, 2024 at 9:39 AM Michael Vogt wrote:
> Hi,
>
> This is v4 of th
s
- Fix validation of arg4 in openat2
- Fix missing zero initialization of open_how
- Define target_open_how with abi_* types
- Warn about unimplemented size if "size" of openat2 is bigger than
target_open_how
Michael Vogt (1):
linux-user: add openat2 support in linux-user
linu
)" is used to
determine if the path is in /proc. Alternatively to ignoring
we could simply fail with `-TARGET_ENOSYS` (or similar) if
`resolve` flags are passed and we found something that looks
like a file in /proc that needs faking.
Signed-off-by: Michael Vogt
Buglink: https://github.co
)" is used to
determine if the path is in /proc. Alternatively to ignoring
we could simply fail with `-TARGET_ENOSYS` (or similar) if
`resolve` flags are passed and we found something that looks
like a file in /proc that needs faking.
Signed-off-by: Michael Vogt
Buglink: https://github.co
From: Michael Vogt
Hi,
This is v3 of the openat2 support in linux-user. Thanks again for the
excellent second round of feedback from Richard Henderson.
This version tries to be closer to the kernels behavior, i.e. now
do_openat2() uses a new copy_struct_from_user() helper that is very
similar
atively to ignoring
we could simply fail with `-TARGET_ENOSYS` (or similar) if
`resolve` flags are passed and we found something that looks
like a file in /proc that needs faking.
Signed-off-by: Michael Vogt
Buglink: https://github.com/osbuild/bootc-image-builder/issues
issing zero initialization of open_how
- Define target_open_how with abi_* types
- Warn about unimplemented size if "size" of openat2 is bigger than
target_open_how
Thanks for Richard Henderson and Florian Schueller for their
feedback.
Michael Vogt (1):
linux
atively to ignoring
we could simply fail with `-TARGET_ENOSYS` (or similar) if
`resolve` flags are passed and we found something that looks
like a file in /proc that needs faking.
Signed-off-by: Michael Vogt
Buglink: https://github.com/osbuild/bootc-image-builder/issues/619
---
linux-user/qemu.
Michael Vogt wrote:
> Tiny patch to add the ioctl wrapper definition for BLKBSZSET.
>
> Signed-off-by: Michael Vogt
> ---
> linux-user/ioctls.h | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/linux-user/ioctls.h b/linux-user/ioctls.h
> index d508d0c04a..3b41128fd
Tiny patch to add the ioctl wrapper definition for BLKBSZSET.
Signed-off-by: Michael Vogt
---
linux-user/ioctls.h | 1 +
1 file changed, 1 insertion(+)
diff --git a/linux-user/ioctls.h b/linux-user/ioctls.h
index d508d0c04a..3b41128fd7 100644
--- a/linux-user/ioctls.h
+++ b/linux-user/ioctls.h
From: Michael Vogt
Tiny patch to add the missing FITRIM ioctl.
Signed-off-by: Michael Vogt
---
linux-user/ioctls.h| 3 +++
linux-user/syscall_defs.h | 1 +
linux-user/syscall_types.h | 5 +
3 files changed, 9 insertions(+)
diff --git a/linux-user/ioctls.h b/linux-user/ioctls.h
Add missing FIFREEZE and FITHAW ioctls.
Signed-off-by: Michael Vogt
---
linux-user/ioctls.h | 6 ++
linux-user/syscall_defs.h | 3 +++
2 files changed, 9 insertions(+)
diff --git a/linux-user/ioctls.h b/linux-user/ioctls.h
index 071f7ca253..1aec9d5836 100644
--- a/linux-user/ioctls.h
25 matches
Mail list logo