Am Mittwoch, den 29.01.2020, 09:45 +0100 schrieb Richard Biener: > On Tue, Jan 28, 2020 at 1:24 PM Uecker, Martin > <martin.uec...@med.uni-goettingen.de> wrote:
> > > > > > Note for the current PTA implementation there's almost no cases we can > > > handle conservatively enough. Consider the simple > > > > > > int a[4]; > > > int *p = &a[1]; > > > uintptr_t pi = (uintptr_t)p; > > > pi += 4; > > > int *q = (int *)pi; > > > > > > our PTA knows that p points to a (but not the exact offset), same for pi > > > (the cast doesn't change the value). Now you add 4 - this could lead > > > you outside of 'a' so the points-to set becomes 'a and anything'. > > > > PVNI would say that 'a' gets exposed in the first case and > > then 'q' can point to all exposed objects because of the > > second cast. > > > > A correct and conservative implementation would do this: > > In the PTA you would need to mark the address of a escaped > > and then later assign a conservative points-to set (all > > escaped objects) to q. > > I see (I'm asking all these questions to see what implementing -fpta-pnvi > would mean). Thank you for looking into this. > That might be a feasible implementation route. How > does "escaped" as used in your answer apply when doing inter-procedural > analysis? I guess we would need to assume points-to sets include > automatic variables that escaped in the caller. Yes. Is this not something the compiler assumes in general? If you have code like this: int pi = foo(p); int *q = bar(pi); where 'foo' and 'bar' are unknown to the compiler, it should have the same semantics with regard to PTA as needed for the casts in PVNI. (except that one knows that q and p have the same value which could be exploited for optimization) > > Yes, this limits optimizations, but I do not think this is > > terrible. (optimizations could be re-enabled with a compiler > > option) > > We'll see. > > > > I'm also not sure what PVNI does to > > > > > > int a[4]; > > > int *p = &a[1]; > > > p += 10; > > > uintptr_t pi = (uintptr_t)p; > > > p = (int *)pi; > > > > > > we assume that p points to a even after p += 10 (but it of course points > > > outside of the object - obvious here, but not necessarily in more > > > obfuscated cases). > > > > This is UB because a pointer to outside of the object is formed. > > > > > Now, can we assume pi points to a? The cast isn't value-changing. Do we > > > have > > > to assume (int *)pi points to anything? So, is > > > > > > p = (int *)(uintptr_t)p; > > > > > > something like "laundering" a pointer? We don't preserve such simple > > > round-trip > > > casts since they are value-preserving. Are they provenance preserving? > > > > Yes, such a pair would be "laundering" as it allows 'p' to then > > point to any exposed object provenance-wise. > > > > For such casts the FE would maybe add a marker. Maybe a calls > > to builtin functions 'builtin_expose(a)' and 'builting_bless'. > > (having those builtins would be interesting on its own, btw). > > Uh, ok. For testing, I implemented builtin_expose by adding in 'find_func_aliases_for_builtin_call' case BUILT_IN_ESCAPE: { make_escape_constraint (gimple_call_arg (t, 0)); return true; } which seems to work, but I wasn't sure about the other function. There are concurrent algorithms which revive dead pointers. They might also need explicit control to work around provenance issues. > > Having said this, some optimizations could still be allowed using > > the "as-if" rule and other lines of reasoning. Specifally, PVNI > > states that 'p' gets assigned the provenance of the object the > > integer values is the address of. So if the compiler can proof > > that the address belongs to certain objects it can reassign the > > points-to set to the new 'p'. Only if there is ambiguity between > > which objects the address belongs to, the reasoning needs to > > be more conservative. > > > > For example: > > int a[3]; > > int b[3]; > > > > &b; // b also exposed Correction: this should be: (intptr_t)&b; as it is the cast to integers and not just the address-taken operation that marks the object exposed. > > int *p = (int*)(uintptr_t)&a[3]; > > > > Here, p could point to the one-after address of 'a' or the > > first element of 'b'. (but only because 'b' was also exposed). > > > > If the compiler can prove that something like this can not > > happen (e.g. by considering offsets), it can still do some > > tracking of points-to sets. > > That's probably the very case that we'll get wrong since > we definitely won't be able to reliably preserve these > kind of laundering points... Maybe the FE could add the builtins ? > I guess they could be obfuscated like > > union { void *p; long l; } u; > > u.p = p; > u.l = u.l; > p = u.p; > > where GCC (and IIRC also now the standard) allows the > type-punning when reading u.p via u.l and vice versa. It is allowed in C but not in C++. > That is, the "conversions" might be hidden in the > memory access types. That means (our PTA tracks > points-to sets of memory) that all stores of pointers > (even to automatic vars that are themselves not exposed) > make them escaped and CSE would need to desperately > avoid CSEing the load from u.p to p or insert laundering > operations. I am not sure I fully understand the proposal. > I guess I'd me much more happy if PVNI said that when > an integer is converted to a pointer and the integer > is value-equivalent to pointers { p1, p2, ... } then > the provenance of the resulting pointer is > that of p1 (or p2, ... which is semantically equivalent) (if the provenance is the same) > and when two pointers p1 and p2 are > value-equivalent and their provenance is not the > same then the behavior is undefined. I see. Then here.. int a[3]; int b[3]; (uintptr_t)&b[0]; // b also exposed int *p = (int*)(uintptr_t)&a[3]; ..the behavior is undefined because the two pointers have identical addresses but different provenance. I agree, from a compiler writer's point-of-view this would be a good solution. But to a programmer, this would be quite difficult to explain. The preference of the working group was that the casts should just work in all cases and do what the programmer intended, even if this prevents some optimization. But I will see that this is added to the list of options under consideration. PVNI-ae-ud assigns the provenance of an exposed object at the address. If there are two possible objects (as in the example above), the pointer could point to both but then has to be used consistently only with only one object. Essentially, we want the pointer to have exactly one provenance but we might delay the decision. The idea is that a compiler might figure out the correct provenance later, e.g. by observing accesses. It is possible to formulate some conditions about when a pointer converted from an integer could get assigned the points-to-set of a value-equivalent pointer: 1) using knowledge about object location in memory: If there is no adjacent object which was exposed, one can conclude that the provenance is the object at this address. 2) based on offsets: If the pointer points in the middle of an object, there is also no ambiguity. 3) a mix of both, to differentiate objects before and after in memory. > That is, > > int a, b; > int *p = &a + 1; > int *q = &b; > if (p == q) > ... undefined ... We considered making the comparison undefined in the specific situation where one of the pointer is one-after pointer and the other a pointer to the beginning of a different object. This would solve the problems with conditional equivalences. Others proposed to make the result of the comparison unspecified, but I think this does not help. At the moment, the consensus is that pointer comparison should be always allowed and the result should only depend on the address. Again, the idea is to make is simpler and more consistent for the programmer. But yes, this makes it more difficult for the compiler writer. Best, Martin