* [PATCH] linux-user/syscall: Silence warning from the undefined behavior sanitizer
@ 2021-02-11 13:29 Thomas Huth
2021-02-11 21:28 ` Laurent Vivier
0 siblings, 1 reply; 5+ messages in thread
From: Thomas Huth @ 2021-02-11 13:29 UTC (permalink / raw)
To: Laurent Vivier, qemu-devel
When compiling QEMU with -fsanitize=undefined, there is a warning when
running "make check-tcg":
TEST linux-test on m68k
../linux-user/syscall.c:10499:34: runtime error: member access within
misaligned address 0x00008006df3c for type 'struct linux_dirent64',
which requires 8 byte alignment
0x00008006df3c: note: pointer points here
00 00 00 00 68 03 28 00 00 00 00 00 5b 96 3e e4 61 4b 05 26 18 00 04 2e 00 00 00 00 da 3f 18 00
^
It's likely not an issue in reality, since I assume that on hosts where
the alignment really matters (like sparc64), the Linux kernel likely
adds the right padding. Anyway, let's use the stw_p() / stq_p() accessor
helpers here to silence the warning and thus to allow to compile the code
with -fsanitize=undefined, too.
Signed-off-by: Thomas Huth <thuth@redhat.com>
---
linux-user/syscall.c | 16 +++++++++-------
1 file changed, 9 insertions(+), 7 deletions(-)
diff --git a/linux-user/syscall.c b/linux-user/syscall.c
index 34760779c8..50de535ade 100644
--- a/linux-user/syscall.c
+++ b/linux-user/syscall.c
@@ -10491,20 +10491,22 @@ static abi_long do_syscall1(void *cpu_env, int num, abi_long arg1,
return -TARGET_EFAULT;
ret = get_errno(sys_getdents64(arg1, dirp, count));
if (!is_error(ret)) {
- struct linux_dirent64 *de;
+ char *de;
int len = ret;
int reclen;
- de = dirp;
+ de = (char *)dirp;
+ #define de64(x) offsetof(struct linux_dirent64, x)
while (len > 0) {
- reclen = de->d_reclen;
+ reclen = lduw_he_p(de + de64(d_reclen));
if (reclen > len)
break;
- de->d_reclen = tswap16(reclen);
- tswap64s((uint64_t *)&de->d_ino);
- tswap64s((uint64_t *)&de->d_off);
- de = (struct linux_dirent64 *)((char *)de + reclen);
+ stw_p(de + de64(d_reclen), reclen);
+ stq_p(de + de64(d_ino), ldq_he_p(de + de64(d_ino)));
+ stq_p(de + de64(d_off), ldq_he_p(de + de64(d_off)));
+ de += reclen;
len -= reclen;
}
+ #undef de64
}
unlock_user(dirp, arg2, ret);
}
--
2.27.0
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [PATCH] linux-user/syscall: Silence warning from the undefined behavior sanitizer
2021-02-11 13:29 [PATCH] linux-user/syscall: Silence warning from the undefined behavior sanitizer Thomas Huth
@ 2021-02-11 21:28 ` Laurent Vivier
2021-02-12 0:35 ` Laurent Vivier
2021-02-12 7:45 ` Thomas Huth
0 siblings, 2 replies; 5+ messages in thread
From: Laurent Vivier @ 2021-02-11 21:28 UTC (permalink / raw)
To: Thomas Huth, qemu-devel
Le 11/02/2021 à 14:29, Thomas Huth a écrit :
> When compiling QEMU with -fsanitize=undefined, there is a warning when
> running "make check-tcg":
>
> TEST linux-test on m68k
> ../linux-user/syscall.c:10499:34: runtime error: member access within
> misaligned address 0x00008006df3c for type 'struct linux_dirent64',
> which requires 8 byte alignment
> 0x00008006df3c: note: pointer points here
> 00 00 00 00 68 03 28 00 00 00 00 00 5b 96 3e e4 61 4b 05 26 18 00 04 2e 00 00 00 00 da 3f 18 00
> ^
>
> It's likely not an issue in reality, since I assume that on hosts where
> the alignment really matters (like sparc64), the Linux kernel likely
> adds the right padding. Anyway, let's use the stw_p() / stq_p() accessor
> helpers here to silence the warning and thus to allow to compile the code
> with -fsanitize=undefined, too.
>
> Signed-off-by: Thomas Huth <thuth@redhat.com>
> ---
> linux-user/syscall.c | 16 +++++++++-------
> 1 file changed, 9 insertions(+), 7 deletions(-)
>
> diff --git a/linux-user/syscall.c b/linux-user/syscall.c
> index 34760779c8..50de535ade 100644
> --- a/linux-user/syscall.c
> +++ b/linux-user/syscall.c
> @@ -10491,20 +10491,22 @@ static abi_long do_syscall1(void *cpu_env, int num, abi_long arg1,
> return -TARGET_EFAULT;
> ret = get_errno(sys_getdents64(arg1, dirp, count));
> if (!is_error(ret)) {
> - struct linux_dirent64 *de;
> + char *de;
> int len = ret;
> int reclen;
> - de = dirp;
> + de = (char *)dirp;
> + #define de64(x) offsetof(struct linux_dirent64, x)
Do we really need the cast to the "(char *)"?
can't we use "&de->XXX" with the accessors?
We don't access the memory, only read the address, the compiler should be happy.
> while (len > 0) {
> - reclen = de->d_reclen;
> + reclen = lduw_he_p(de + de64(d_reclen));
to avoid human error, it would be better to let the compiler take the good accessor:
ldn_he_p(&de->d_reclen, sizeof(de->d_reclen))
> if (reclen > len)
> break;
> - de->d_reclen = tswap16(reclen);
> - tswap64s((uint64_t *)&de->d_ino);
> - tswap64s((uint64_t *)&de->d_off);
> - de = (struct linux_dirent64 *)((char *)de + reclen);
> + stw_p(de + de64(d_reclen), reclen);
> + stq_p(de + de64(d_ino), ldq_he_p(de + de64(d_ino)));
> + stq_p(de + de64(d_off), ldq_he_p(de + de64(d_off)));
and stwn_he_p() here too.
> + de += reclen;
> len -= reclen;
> }
> + #undef de64
> }
> unlock_user(dirp, arg2, ret);
> }
>
Thank you Thomas for your help.
Laurent
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH] linux-user/syscall: Silence warning from the undefined behavior sanitizer
2021-02-11 21:28 ` Laurent Vivier
@ 2021-02-12 0:35 ` Laurent Vivier
2021-02-12 7:56 ` Thomas Huth
2021-02-12 7:45 ` Thomas Huth
1 sibling, 1 reply; 5+ messages in thread
From: Laurent Vivier @ 2021-02-12 0:35 UTC (permalink / raw)
To: Thomas Huth, qemu-devel
Le 11/02/2021 à 22:28, Laurent Vivier a écrit :
> Le 11/02/2021 à 14:29, Thomas Huth a écrit :
>> When compiling QEMU with -fsanitize=undefined, there is a warning when
>> running "make check-tcg":
>>
>> TEST linux-test on m68k
>> ../linux-user/syscall.c:10499:34: runtime error: member access within
>> misaligned address 0x00008006df3c for type 'struct linux_dirent64',
>> which requires 8 byte alignment
>> 0x00008006df3c: note: pointer points here
>> 00 00 00 00 68 03 28 00 00 00 00 00 5b 96 3e e4 61 4b 05 26 18 00 04 2e 00 00 00 00 da 3f 18 00
>> ^
>>
>> It's likely not an issue in reality, since I assume that on hosts where
>> the alignment really matters (like sparc64), the Linux kernel likely
>> adds the right padding. Anyway, let's use the stw_p() / stq_p() accessor
>> helpers here to silence the warning and thus to allow to compile the code
>> with -fsanitize=undefined, too.
Wait... if the alignment differs between m68k and the host, I guess the size of the structure differs?
In this case we cannot use the guest memory to call the host syscall, we must allocate a host
structure and copy the values into the guest structure.
Thanks,
Laurent
>> Signed-off-by: Thomas Huth <thuth@redhat.com>
>> ---
>> linux-user/syscall.c | 16 +++++++++-------
>> 1 file changed, 9 insertions(+), 7 deletions(-)
>>
>> diff --git a/linux-user/syscall.c b/linux-user/syscall.c
>> index 34760779c8..50de535ade 100644
>> --- a/linux-user/syscall.c
>> +++ b/linux-user/syscall.c
>> @@ -10491,20 +10491,22 @@ static abi_long do_syscall1(void *cpu_env, int num, abi_long arg1,
>> return -TARGET_EFAULT;
>> ret = get_errno(sys_getdents64(arg1, dirp, count));
>> if (!is_error(ret)) {
>> - struct linux_dirent64 *de;
>> + char *de;
>> int len = ret;
>> int reclen;
>> - de = dirp;
>> + de = (char *)dirp;
>> + #define de64(x) offsetof(struct linux_dirent64, x)
>
> Do we really need the cast to the "(char *)"?
>
> can't we use "&de->XXX" with the accessors?
> We don't access the memory, only read the address, the compiler should be happy.
>
>
>> while (len > 0) {
>> - reclen = de->d_reclen;
>> + reclen = lduw_he_p(de + de64(d_reclen));
>
> to avoid human error, it would be better to let the compiler take the good accessor:
>
> ldn_he_p(&de->d_reclen, sizeof(de->d_reclen))
>
>> if (reclen > len)
>> break;
>> - de->d_reclen = tswap16(reclen);
>> - tswap64s((uint64_t *)&de->d_ino);
>> - tswap64s((uint64_t *)&de->d_off);
>> - de = (struct linux_dirent64 *)((char *)de + reclen);
>> + stw_p(de + de64(d_reclen), reclen);
>> + stq_p(de + de64(d_ino), ldq_he_p(de + de64(d_ino)));
>> + stq_p(de + de64(d_off), ldq_he_p(de + de64(d_off)));
>
> and stwn_he_p() here too.
>
>> + de += reclen;
>> len -= reclen;
>> }
>> + #undef de64
>> }
>> unlock_user(dirp, arg2, ret);
>> }
>>
>
> Thank you Thomas for your help.
>
> Laurent
>
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH] linux-user/syscall: Silence warning from the undefined behavior sanitizer
2021-02-11 21:28 ` Laurent Vivier
2021-02-12 0:35 ` Laurent Vivier
@ 2021-02-12 7:45 ` Thomas Huth
1 sibling, 0 replies; 5+ messages in thread
From: Thomas Huth @ 2021-02-12 7:45 UTC (permalink / raw)
To: Laurent Vivier, qemu-devel
On 11/02/2021 22.28, Laurent Vivier wrote:
> Le 11/02/2021 à 14:29, Thomas Huth a écrit :
>> When compiling QEMU with -fsanitize=undefined, there is a warning when
>> running "make check-tcg":
>>
>> TEST linux-test on m68k
>> ../linux-user/syscall.c:10499:34: runtime error: member access within
>> misaligned address 0x00008006df3c for type 'struct linux_dirent64',
>> which requires 8 byte alignment
>> 0x00008006df3c: note: pointer points here
>> 00 00 00 00 68 03 28 00 00 00 00 00 5b 96 3e e4 61 4b 05 26 18 00 04 2e 00 00 00 00 da 3f 18 00
>> ^
>>
>> It's likely not an issue in reality, since I assume that on hosts where
>> the alignment really matters (like sparc64), the Linux kernel likely
>> adds the right padding. Anyway, let's use the stw_p() / stq_p() accessor
>> helpers here to silence the warning and thus to allow to compile the code
>> with -fsanitize=undefined, too.
>>
>> Signed-off-by: Thomas Huth <thuth@redhat.com>
>> ---
>> linux-user/syscall.c | 16 +++++++++-------
>> 1 file changed, 9 insertions(+), 7 deletions(-)
>>
>> diff --git a/linux-user/syscall.c b/linux-user/syscall.c
>> index 34760779c8..50de535ade 100644
>> --- a/linux-user/syscall.c
>> +++ b/linux-user/syscall.c
>> @@ -10491,20 +10491,22 @@ static abi_long do_syscall1(void *cpu_env, int num, abi_long arg1,
>> return -TARGET_EFAULT;
>> ret = get_errno(sys_getdents64(arg1, dirp, count));
>> if (!is_error(ret)) {
>> - struct linux_dirent64 *de;
>> + char *de;
>> int len = ret;
>> int reclen;
>> - de = dirp;
>> + de = (char *)dirp;
>> + #define de64(x) offsetof(struct linux_dirent64, x)
>
> Do we really need the cast to the "(char *)"?
>
> can't we use "&de->XXX" with the accessors?
> We don't access the memory, only read the address, the compiler should be happy.
That's what I thought and tried first, too. Unfortunately, it did not help
to fix the issue, I had to take the detour via the char*
I guess the compiler also checks the alignment of the pointer when it gets
assigned to the next record below ("de = ...").
Thomas
>
>> while (len > 0) {
>> - reclen = de->d_reclen;
>> + reclen = lduw_he_p(de + de64(d_reclen));
>
> to avoid human error, it would be better to let the compiler take the good accessor:
>
> ldn_he_p(&de->d_reclen, sizeof(de->d_reclen))
>
>> if (reclen > len)
>> break;
>> - de->d_reclen = tswap16(reclen);
>> - tswap64s((uint64_t *)&de->d_ino);
>> - tswap64s((uint64_t *)&de->d_off);
>> - de = (struct linux_dirent64 *)((char *)de + reclen);
>> + stw_p(de + de64(d_reclen), reclen);
>> + stq_p(de + de64(d_ino), ldq_he_p(de + de64(d_ino)));
>> + stq_p(de + de64(d_off), ldq_he_p(de + de64(d_off)));
>
> and stwn_he_p() here too.
>
>> + de += reclen;
>> len -= reclen;
>> }
>> + #undef de64
>> }
>> unlock_user(dirp, arg2, ret);
>> }
>>
>
> Thank you Thomas for your help.
>
> Laurent
>
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH] linux-user/syscall: Silence warning from the undefined behavior sanitizer
2021-02-12 0:35 ` Laurent Vivier
@ 2021-02-12 7:56 ` Thomas Huth
0 siblings, 0 replies; 5+ messages in thread
From: Thomas Huth @ 2021-02-12 7:56 UTC (permalink / raw)
To: Laurent Vivier, qemu-devel
On 12/02/2021 01.35, Laurent Vivier wrote:
> Le 11/02/2021 à 22:28, Laurent Vivier a écrit :
>> Le 11/02/2021 à 14:29, Thomas Huth a écrit :
>>> When compiling QEMU with -fsanitize=undefined, there is a warning when
>>> running "make check-tcg":
>>>
>>> TEST linux-test on m68k
>>> ../linux-user/syscall.c:10499:34: runtime error: member access within
>>> misaligned address 0x00008006df3c for type 'struct linux_dirent64',
>>> which requires 8 byte alignment
>>> 0x00008006df3c: note: pointer points here
>>> 00 00 00 00 68 03 28 00 00 00 00 00 5b 96 3e e4 61 4b 05 26 18 00 04 2e 00 00 00 00 da 3f 18 00
>>> ^
>>>
>>> It's likely not an issue in reality, since I assume that on hosts where
>>> the alignment really matters (like sparc64), the Linux kernel likely
>>> adds the right padding. Anyway, let's use the stw_p() / stq_p() accessor
>>> helpers here to silence the warning and thus to allow to compile the code
>>> with -fsanitize=undefined, too.
>
> Wait... if the alignment differs between m68k and the host, I guess the size of the structure differs?
No, as far as I understand, the size and layout of the structure are the
same on all architecture. The problem is that the "dirp =
lock_user(VERIFY_WRITE, arg2, count, 0)" already ends up in a pointer that
is only aligned to a 4-byte boundary. Since the m68k code is only restricted
to a 4-byte alignment, arg2 is only aligned to 4 bytes. But if the host
needs 8-byte alignment for the struct, we've certainly lost here.
Having said that, I think my patch is still wrong. It silences the ubsan
warnings, but it won't fix the problem when the code is e.g. running on a
sparc64 host. There we likely need to make sure that the buffer on the host
is already aligned to an 8-byte boundary when doing the sys_getdents64()
call to the host kernel.
So I guess we need a bounce buffer here anyway?
Thomas
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2021-02-12 7:57 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2021-02-11 13:29 [PATCH] linux-user/syscall: Silence warning from the undefined behavior sanitizer Thomas Huth
2021-02-11 21:28 ` Laurent Vivier
2021-02-12 0:35 ` Laurent Vivier
2021-02-12 7:56 ` Thomas Huth
2021-02-12 7:45 ` Thomas Huth
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).