Received: by 2002:a05:6a10:a852:0:0:0:0 with SMTP id d18csp3914669pxy; Tue, 4 May 2021 12:55:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzhT4ozSS+wPSofxk5aPsXEOf/Cf4N0vs6X+p3YEyGseQ41k8uAOSesLIP2D1HXZZ1i5IQC X-Received: by 2002:a05:6402:3072:: with SMTP id bs18mr23794146edb.367.1620158150308; Tue, 04 May 2021 12:55:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620158150; cv=none; d=google.com; s=arc-20160816; b=yfBT0cmS7qIh83ctfuQy6L7e8bRe6H+z4dKTvWrWYqCcwrYjE4QYG3V7dN4wAVb+uY n0vNVeQb/d7DsfDeuDJbcDP0O8rXRf8sJoonb9PQL6Si8vLHoIcE72NDJFa3RaepKUGW +dVkmnBFXbAZPn0XoosW1WoFhjYrWdXnaEbNLPlm0Elh2Zqlhi26c0wjFO3nEMUcAUf6 3q7lFv9SNvXOxHR7VmYr3zdNRsVV+9dcKUGQEFdqZVhqwA7fGDcSsmUQH60rsTmeJy16 4qopatd7tphYhCIxzJdoJS3v9VuM8YX3+5xs9dRSBCP+dr3VjOFPA6DqhUqd1GYeFBgz bEeg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=HeULlWoRhXPsavwV4q1vSV+JLoksQc2KZoM7OPy9Kkg=; b=vCCzzz2lrBsdyyOdjOroTVu4gIsR0eNilguoIxjyzfqFCAJxdD4Pd3kmFvZ+c/U3z6 iOhP0URLKPCo+gP9xqpKbzOCTsg4Q1TSamfy7L1qxwsNVX8gGlgLqOBaju2+wGQTHVuA aZ+aqLa7IXJhn13/V4Iecp9ShPNj4zT12TERa9ZZcOLLGjJROHE1i5CeevlU/7f21vTF TRWuQ8zULT740eugEx2dPR1QV0H4yPeYYEViNTBvdp92j/kcUxkmKr4/LvnsnoMroHn9 JWPahvOigNlUKeTAFgRDN2VF4L/wbVnaJD2/34o2QR+8W760i3gM92sYBVcZTWpkgNjz 5sQw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n13si3211244ejy.531.2021.05.04.12.55.19; Tue, 04 May 2021 12:55:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232209AbhEDTyv (ORCPT + 99 others); Tue, 4 May 2021 15:54:51 -0400 Received: from outgoing-auth-1.mit.edu ([18.9.28.11]:39510 "EHLO outgoing.mit.edu" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S232636AbhEDTyu (ORCPT ); Tue, 4 May 2021 15:54:50 -0400 Received: from cwcc.thunk.org (pool-72-74-133-215.bstnma.fios.verizon.net [72.74.133.215]) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 144Jrm9K032216 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 4 May 2021 15:53:48 -0400 Received: by cwcc.thunk.org (Postfix, from userid 15806) id 3D88D15C3C43; Tue, 4 May 2021 15:53:48 -0400 (EDT) Date: Tue, 4 May 2021 15:53:48 -0400 From: "Theodore Ts'o" To: Eric Biggers Cc: harshad shirwadkar , Andreas Dilger , Ext4 Developers List , Harshad Shirwadkar Subject: Re: [PATCH] e2fsck: fix portability problems caused by unaligned accesses Message-ID: References: <20210504031024.3888676-1-tytso@mit.edu> <8E9C71E8-FE5F-4CB8-BA62-8D8895DCA92A@dilger.ca> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Tue, May 04, 2021 at 12:14:20PM -0700, Eric Biggers wrote: > On Tue, May 04, 2021 at 10:55:44AM -0700, harshad shirwadkar wrote: > > > However, wouldn't it be easier to just add __attribute__((packed)) to the > > > definition of struct journal_block_tag_t? > > While we know that journal_block_tag_t can be unaligned, our code > > should still ensure that we are reading this struct in an > > alignment-safe way (like Ted's patch does). IIUC, using > > __attribute__((packed)) might result in us keeping the door open for > > unaligned accesses in future. If someone tries to read 4 bytes > > starting at &journal_block_tag_t->t_flags, with attribute packed, > > UBSAN won't complain but this may still cause issues on some > > architectures. > > I don't understand your concern here. Accesses to a packed struct are assumed > to be unaligned -- that's why I suggested it. The packed attribute is pretty > widely used to implement unaligned accesses in C (as an alternative to memcpy() > or explicit byte-by-byte accesses, both of which also work, though the latter > seems to run into an UBSAN bug in this case). So part of the problem is that documentation for __attribute__((packed)) is terrible. From the GCC documentation: 'packed' The 'packed' attribute specifies that a structure member should have the smallest possible alignment--one bit for a bit-field and one byte otherwise, unless a larger value is specified with the 'aligned' attribute. The attribute does not apply to non-member objects. For example in the structure below, the member array 'x' is packed so that it immediately follows 'a' with no intervening padding: struct foo { char a; int x[2] __attribute__ ((packed)); }; _Note:_ The 4.1, 4.2 and 4.3 series of GCC ignore the 'packed' attribute on bit-fields of type 'char'. This has been fixed in GCC 4.4 but the change can lead to differences in the structure layout. See the documentation of '-Wpacked-bitfield-compat' for more information. I was under the impression that the only thing the packed attribute did was to change the structure layout. So I was about to reply with a message saying, "How does this do anything? The structure is already packed, so isn't this a no-op?" But I did the experiment, and your suggestion worked.... so I then started digging for documentation for this being guaranteed behavior for gcc and clang.... and I found nothing but blog posts. One of them is by Roland Dreir (infiniband Linux hacker): http://digitalvampire.org/blog/index.php/2006/07/31/why-you-shouldnt-use-__attribute__packed/ which does state: But adding __attribute__((packed)) goes further than just telling gcc that it shouldn’t add padding — it also tells gcc that it can’t make any assumptions about the alignment of accesses to structure members But I wouldn't exactly call this documented behavior on the part of GCC. I guess we could hope that behavior that apparently has been around for 15+ years is probably not going to change on us, but I would really prefer something in writing. :-) - Ted P.S. Roland's blog goes on to say: ... And this leads to disastrously bad code on some architectures. and has some examples of some really terrible codegen on ia64 and sparc64.