[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH] x86/mem_sharing: silence ubsan warning
On Mon, Jan 4, 2021 at 12:21 PM Tamas K Lengyel <tamas@xxxxxxxxxxxxx> wrote: > > On Mon, Jan 4, 2021 at 7:31 AM Andrew Cooper <andrew.cooper3@xxxxxxxxxx> > wrote: > > > > On 03/01/2021 18:47, Tamas K Lengyel wrote: > > > Running Xen compiled with UBSAN produces a warning for mismatched size. > > > It's > > > benign but this patch silences the warning. > > > > > > Signed-off-by: Tamas K Lengyel <tamas@xxxxxxxxxxxxx> > > > --- > > > xen/arch/x86/mm/mem_sharing.c | 5 ++++- > > > 1 file changed, 4 insertions(+), 1 deletion(-) > > > > > > diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c > > > index c428fd16ce..6920077dbf 100644 > > > --- a/xen/arch/x86/mm/mem_sharing.c > > > +++ b/xen/arch/x86/mm/mem_sharing.c > > > @@ -1638,7 +1638,10 @@ static int fork_hap_allocation(struct domain *cd, > > > struct domain *d) > > > rc = hap_set_allocation(cd, mb << (20 - PAGE_SHIFT), &preempted); > > > paging_unlock(cd); > > > > > > - return preempted ? -ERESTART : rc; > > > + if ( preempted ) > > > + rc = -ERESTART; > > > + > > > + return rc; > > > > I can't repro this at all, even with some simplified examples. > > > > -ERESTART is int (it is an enum constant in C files), as is rc, so I > > can't spot a legitimate UBSAN complaint here. > > > > Which compiler, and/or do you have the exact complaint available? > > It was with gcc-7 on debian buster but can't recreate it after a make > clean & make, it's now gone ¯\_(ツ)_/¯, seems like it was just a bad > build. Sorry for the noise. In a recent build with gcc-10 I got the warning again: (XEN) ================================================================================ (XEN) UBSAN: Undefined behaviour in mem_sharing.c:1659:34 (XEN) load of value 6 is not a valid value for type '_Bool' (XEN) ----[ Xen-4.15-unstable x86_64 debug=y ubsan=y Not tainted ]---- (XEN) CPU: 0 (XEN) RIP: e008:[<ffff82d040321271>] common/ubsan/ubsan.c#ubsan_epilogue+0x5/0xc6 (XEN) RFLAGS: 0000000000010086 CONTEXT: hypervisor (d0v0) (XEN) rax: 0000000000000000 rbx: ffff83007fc7f930 rcx: 0000000000000000 (XEN) rdx: ffff83007fc7ffd0 rsi: 000000000000000a rdi: ffff83007fc7f930 (XEN) rbp: 0000000000000006 rsp: ffff83007fc7f8f0 r8: 00000000ffffffff (XEN) r9: 0000000000000000 r10: ffff83007fc7f908 r11: 0000000000000000 (XEN) r12: ffff83036bb58000 r13: ffff830241ed0000 r14: 0000000000000006 (XEN) r15: 0000000000000000 cr0: 0000000080050033 cr4: 0000000000372660 (XEN) cr3: 00000002466ab000 cr2: 00007f32f50a514d (XEN) fsb: 00007f32f4e6c2c0 gsb: ffff8881f2800000 gss: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e010 cs: e008 (XEN) Xen code around <ffff82d040321271> (common/ubsan/ubsan.c#ubsan_epilogue+0x5/0xc6): (XEN) 00 eb c2 55 53 48 89 fb <0f> 0b 48 8d 3d ee 22 53 00 e8 ec 2a 00 00 48 85 (XEN) Xen stack trace from rsp=ffff83007fc7f8f0: (XEN) ffff82d040c2f7b2 0000000000000006 ffff82d0403222a2 0000000000240036 (XEN) ffff83036bb58748 00007f32f50e9010 0000000000000000 ffff83036bb586a0 (XEN) 0000000000000202 00007f32f50e9010 0000000000000000 ffff82d0404c9101 (XEN) 0000004100000000 ffff83036bb586a0 ffff82d040f88910 ffff82d000000040 (XEN) ffff83007fc7fb30 ffff82d040539437 ffff82004001dfb8 0000000000000001 (XEN) ffff83007fc7fb30 ffff83007fc7fa88 0000000000000206 ffff830241ed0000 (XEN) 0000000000000000 0000000000000003 ffff83036bb58000 0000000000020009 (XEN) 0000000000030001 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000016 0000000000000016 ffff830361f69000 (XEN) deadbeefdeadf00d 0000000000000000 00007f32f50e9010 ffff82d040583da6 (XEN) 00007f32f50e9010 0000000000000016 0000000000000008 ffff82d040f8ed40 (XEN) 0000000000423000 0000000000800163 00000000000000b0 0000000000000016 (XEN) 0000000000000016 ffff830361f69000 deadbeefdeadf00d 0000000000000000 (XEN) 00007f32f50e9010 ffff82d040565a1a 00007f32f50e9010 00007d2fbf0716c8 (XEN) 0000000000ff5800 ffff82d040f8e940 ffff82d040f8ed40 0000000000000100 (XEN) 0000000000000001 0000000000000028 0000000000000001 0000000000000028 (XEN) 0000000000000000 ffff82e006d73f80 0000000000000001 0000000000000016 (XEN) 0000000000000016 ffff830361f69000 deadbeefdeadf00d 0000000000000000 (XEN) 00007f32f50e9010 ffff82d040268334 0000000000000100 0000000000000000 (XEN) 000000000012ca7c 0000000000000000 0000000000000000 ffff830364a40000 (XEN) Xen call trace: (XEN) [<ffff82d040321271>] R common/ubsan/ubsan.c#ubsan_epilogue+0x5/0xc6 (XEN) [<ffff82d0403222a2>] S __ubsan_handle_load_invalid_value+0x92/0xc9 (XEN) [<ffff82d0404c9101>] S mem_sharing_memop+0x4fc4/0x5e4c (XEN) [<ffff82d040539437>] S arch/x86/domain_page.c#mapcache_current_vcpu+0x47/0x3ea (XEN) [<ffff82d040583da6>] S subarch_memory_op+0xc4f/0xc80 (XEN) [<ffff82d040565a1a>] S arch_memory_op+0x45/0x2bd9 (XEN) [<ffff82d040268334>] S do_memory_op+0x4ce/0x7330 (XEN) [<ffff82d0402a6ad2>] S xmem_pool_alloc+0xd61/0x1325 (XEN) [<ffff82d04028b8ec>] S common/timer.c#timer_lock+0x156/0x694 (XEN) [<ffff82d0402e21d8>] S common/sched/credit2.c#replenish_domain_budget+0/0x3ae (XEN) [<ffff82d040309c81>] S sched_init_domain+0x14e/0x47c (XEN) [<ffff82d04020b05c>] S domain_create+0x70a/0xd55 (XEN) [<ffff82d0402b1631>] S domctl_lock_release+0x6b/0xd9 (XEN) [<ffff82d0402b5f20>] S do_domctl+0x4819/0x49f5 (XEN) [<ffff82d04057ad4e>] S do_mmu_update+0x34ec/0x36a1 (XEN) [<ffff82d040564913>] S update_cr3+0x8e/0x1b0 (XEN) [<ffff82d040507b55>] S arch/x86/pv/domain.c#_toggle_guest_pt+0x34/0x177 (XEN) [<ffff82d040508edd>] S toggle_guest_mode+0x143/0x45f (XEN) [<ffff82d04051534d>] S do_iret+0x206/0x530 (XEN) [<ffff82d040513ba6>] S pv_hypercall+0x866/0xef3 (XEN) [<ffff82d040507b55>] S arch/x86/pv/domain.c#_toggle_guest_pt+0x34/0x177 (XEN) [<ffff82d040508edd>] S toggle_guest_mode+0x143/0x45f (XEN) [<ffff82d04062c457>] S lstar_enter+0x127/0x130 (XEN) (XEN) ================================================================================ Tamas
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |