Re: [PATCH 0/2] --padding option to combine with --with_flexible_array

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, Sep 28, 2024 at 06:36:38AM +0200, Willy Tarreau wrote:
> On Fri, Sep 27, 2024 at 11:15:03PM +0200, Willy Tarreau wrote:
> > Hi Arnaldo!
> > 
> > On Fri, Sep 27, 2024 at 03:59:56PM -0300, Arnaldo Carvalho de Melo wrote:
> > > From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
> > > 
> > > Hi,
> > > 
> > > 	This implements --padding, that combined with the already
> > > available --with_flexible_array option may catch some questionable
> > > structs.
> > > 
> > > 	This comes from a quick discussion I had with Willy Tareau after
> > > Gustavo's talk at this year's Kernel Recipes.
> > > 
> > > 	I have this in the 'next' branch of:
> > > 
> > > https://git.kernel.org/pub/scm/devel/pahole/pahole.git
> > > 
> > > 	Willy, is that what you had in mind?
> > 
> > Oh that was fast!
> > 
> > I'm looking at the output here:
> > 
> >    http://oldvger.kernel.org/~acme/pahole--padding_ge_1_--with_flexible_array.6.10.10-200.fc40.x86_64.txt
> > 
> > I'm seeing in the output above that mem_cgroup was reported due to 48
> > bytes padding being caused by extra alignment. I'm not sure what to
> > think about it to be honest, there could be pros and cons. However it's
> > true that if this struct is embedded inside another one, it starts to
> > smell nevertheless, and such a case is not much frequent so it should
> > be a low rate of false positives in the worst case.

Indeed, looking for structs with a flexible array that have padding
_and_ is embedded in another one looks something we should output when
asking for --with_flexible_array and --padding.

We already have "previous struct has padding", but we only see it with
--with_flexible_array and --padding right now if the struct that has it
embedded also has a flexible array _and_ padding.

Maybe we need both --embedded_flexible_array and --embedded_padding for
ultimate flexibility?

I.e. all of --with_flexible_array, --padding, --embedded_flexible_array
and --embedded_padding have value even when asked for individually, I'd
wager.

> > The output is clearly reviewable by hand, that's really cool!
> 
> So I tried it on haproxy. The first good news is that it didn't spot
> anything, indicating that it doesn't seem to trigger false-positives
> (the second good news being that I don't have to fix anything there :-)).
> 
> For example I have such a struct that contains a forced alignment hole
> before the flex array and it rightfully didn't catch it:
> 
>   struct ebmb_node {
>         struct eb_node             node;                 /*     0    36 */
> 
>         /* XXX 4 bytes hole, try to pack */
> 
>         union {
>         } __attribute__((__aligned__(8)));               /*    40     0 */
>         unsigned char              key[];                /*    40     0 */
> 
>         /* size: 40, cachelines: 1, members: 3 */
>         /* sum members: 36, holes: 1, sum holes: 4 */
>         /* forced alignments: 1, forced holes: 1, sum forced holes: 4 */
>         /* last cacheline: 40 bytes */
>   } __attribute__((__aligned__(8)));
> 
> But it correctly spots this one that we imagined during our discussion:
> 
>   struct foo {
>         void *                     ptr;                  /*     0     8 */
>         int                        number;               /*     8     4 */
>         char                       array[];              /*    12     0 */
> 
>         /* size: 16, cachelines: 1, members: 3 */
>         /* padding: 4 */
>         /* last cacheline: 16 bytes */
>   };
> 
> So that looks all good to me!

great!
 
> BTW, while building the -next branch (ubuntu 22 arm64 gcc11.4), I faced
> this warning that you might be interested in, and that didn't appear in
> the master branch:
> 
>   In file included from /usr/include/string.h:535,
>                    from /usr/include/obstack.h:136,
>                    from /home/willy/pahole/dwarves.h:13,
>                    from /home/willy/pahole/btf_encoder.c:13:
>   In function strncpy,
>       inlined from btf_encoder__add_func_proto at /home/willy/pahole/btf_encoder.c:749:4:
>   /usr/include/aarch64-linux-gnu/bits/string_fortified.h:95:10: warning: __builtin_strncpy specified bound 128 equals destination size [-Wstringop-truncation]
>      95 |   return __builtin___strncpy_chk (__dest, __src, __len,
>         |          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>      96 |                                   __glibc_objsize (__dest));
>         |                                   ~~~~~~~~~~~~~~~~~~~~~~~~~
>   In function strncpy,
>       inlined from btf_encoder__add_func at /home/willy/pahole/btf_encoder.c:1172:4:
>   /usr/include/aarch64-linux-gnu/bits/string_fortified.h:95:10: warning: __builtin_strncpy specified bound 128 equals destination size [-Wstringop-truncation]
>      95 |   return __builtin___strncpy_chk (__dest, __src, __len,
>         |          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>      96 |                                   __glibc_objsize (__dest));
>         |                                   ~~~~~~~~~~~~~~~~~~~~~~~~~

I think Eduard Zingerman has fixed this and that patch is in a series
from Alan Maguire, I'll try and process those patches now.

> Do not hesitate to ask me for some tests if needed. I can also bisect
> if needed.

Sure




[Index of Archives]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux