Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp4617891pxv; Tue, 6 Jul 2021 05:26:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxr1aPJxsEdXefAlrOXrynKiHVMBISsvc64l0ZJuSOawILePyRz0h7AWrGnE4mKczupi+kl X-Received: by 2002:a17:906:9742:: with SMTP id o2mr18332425ejy.532.1625574412992; Tue, 06 Jul 2021 05:26:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625574412; cv=none; d=google.com; s=arc-20160816; b=vg6EXvWJTmGtFqSiBqNif7BM+yYRg8z3blhLPueprRUz7y6GahwNE5PSd2xQHQxCJo x4tchMvft709YP889W/JW6Zruu6EG6j5u9lZCO+PMY9bzOuFRjZNiwDzLS4C/nxlE1ES XzaIlhTNmSHGaR47SUHAlUez7B6LcovfVewhG5v6HZN0iS5VTF9uageen9NzRgkNg6xH nZEyoQcjIi52mu9oXSoFJ+AtSo0g8jJ9qvPDCc64v0xOUzkC9aSEyh86Zku4qsUW+dEB NUp5wmYtXlp2sgbx7LDUV5bAmyVP460ZGOntNdmZCd1BIOcZ+lR3eDykIcuO9a2WEU12 VmCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Fz8nF0VvqASVf4DbdzvDOafrQ9TSRbCa0m4+JXcIrn0=; b=EBXnxDPu7McQPlV092yoDAqhvNxkxO92pt7+Xuuj6PBcg+2lV0LT3rh3RN3iCTqRRI Co60+N3Umc9C5rfrrb5pyjPSfb25NMZRnBBrCrU31Rk6olbm1MQtm5CQjNI8fUIsR5lY YqxORBKrv3cDYrPLJiHfNpkuHTqtus53U2DkP8jkTagYpqSt5Ig2WwlmzpxlhTD8gGCr 155/y72XzG/3OF6ZNYS6pBwBZRiPNchJJ59y5A6O56YTMXBwK09ctEZ0jC0F5LkAkXPd gREHb2fVLz9zGFtGpa15dPPVcCR68dkGr0s/GGbtNpaCUNLEVP0aT3rKbNZAlOJRM/Qn yRUQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=SBM+5pSX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id jy12si14643433ejc.729.2021.07.06.05.26.29; Tue, 06 Jul 2021 05:26:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=SBM+5pSX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242857AbhGFM1y (ORCPT + 99 others); Tue, 6 Jul 2021 08:27:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54992 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S245147AbhGFMM3 (ORCPT ); Tue, 6 Jul 2021 08:12:29 -0400 Received: from casper.infradead.org (casper.infradead.org [IPv6:2001:8b0:10b:1236::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 840FDC061574; Tue, 6 Jul 2021 04:59:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=Fz8nF0VvqASVf4DbdzvDOafrQ9TSRbCa0m4+JXcIrn0=; b=SBM+5pSXppWogXeoTfoIyFNkHB XKLpcFUeu4QHdxqUQYpq5/S6lr25MvHybzFvvfwTkwSKIdDzAgOHZfnr2KlLz/2/zR3Lwzb/ikYVx Bdt10jcYODzGKXZQljrIxfTlBPYXB36oZnNwD5Kuvai4a9t3Qoi9bLjrbmTuIJk3I+yAVeX+UO6d7 Hbo/86Qsn04ajnJbmi1md9nkse6oxQNQGt+RP9hR3QVEuT5zNkqYDacL1yFi7LCHzn0IPji2lxh51 Z7AlbJrtqx9fEpsV8T9Et8TGJKzVqRmMjzituz/jXXLXasiP+QpGt7SSlbE0SyVL+vIGKqstMq967 wHIzxW9A==; Received: from willy by casper.infradead.org with local (Exim 4.94.2 #2 (Red Hat Linux)) id 1m0jjE-00BHHR-Io; Tue, 06 Jul 2021 11:59:08 +0000 Date: Tue, 6 Jul 2021 12:59:04 +0100 From: Matthew Wilcox To: "Leizhen (ThunderTown)" Cc: Christoph Hellwig , "Darrick J . Wong" , linux-xfs , linux-fsdevel , linux-kernel Subject: Re: [PATCH -next 1/1] iomap: Fix a false positive of UBSAN in iomap_seek_data() Message-ID: References: <20210702092109.2601-1-thunder.leizhen@huawei.com> <492c7a7b-6f2e-de45-c733-51c80422305e@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 06, 2021 at 12:08:14PM +0100, Matthew Wilcox wrote: > On Mon, Jul 05, 2021 at 11:35:08AM +0800, Leizhen (ThunderTown) wrote: > > > > > > On 2021/7/3 3:56, Matthew Wilcox wrote: > > > On Fri, Jul 02, 2021 at 05:21:09PM +0800, Zhen Lei wrote: > > >> Move the evaluation expression "size - offset" after the "if (offset < 0)" > > >> judgment statement to eliminate a false positive produced by the UBSAN. > > >> > > >> No functional changes. > > >> > > >> ========================================================================== > > >> UBSAN: Undefined behaviour in fs/iomap.c:1435:9 > > >> signed integer overflow: > > >> 0 - -9223372036854775808 cannot be represented in type 'long long int' > > > > > > I don't understand. I thought we defined the behaviour of signed > > > integer overflow in the kernel with whatever-the-gcc-flag-is? > > > > -9223372036854775808 ==> 0x8000000000000000 ==> -0 (actually, this is incorrect. think about how twos-complement arithmetic works. first you negate every bit, so 8000..000 turns into 7fff..fff, then you add one, returning to 8000..000, so -LLONG_MIN == LLONG_MIN) > > I don't fully understand what you mean. This is triggered by explicit error > > injection '-0' at runtime, which should not be detected by compilation options. > > We use -fwrapv on the gcc command line: > > '-fwrapv' > This option instructs the compiler to assume that signed arithmetic > overflow of addition, subtraction and multiplication wraps around > using twos-complement representation. This flag enables some > optimizations and disables others. > > > lseek(r1, 0x8000000000000000, 0x3) > > I'll see about adding this to xfstests ... I have and it doesn't produce the problem. My config: CONFIG_UBSAN=y # CONFIG_UBSAN_TRAP is not set CONFIG_CC_HAS_UBSAN_BOUNDS=y CONFIG_UBSAN_BOUNDS=y CONFIG_UBSAN_ONLY_BOUNDS=y CONFIG_UBSAN_SHIFT=y CONFIG_UBSAN_DIV_ZERO=y CONFIG_UBSAN_BOOL=y CONFIG_UBSAN_ENUM=y # CONFIG_UBSAN_ALIGNMENT is not set CONFIG_UBSAN_SANITIZE_ALL=y # CONFIG_TEST_UBSAN is not set I even went as far as adding printks to be sure I'm hitting it: hole length 0x8000000000000000 data length 0x8000000000000000 Are you compiling with: KBUILD_CFLAGS += -fno-strict-overflow Or have you done something weird? What compiler version are you using?