]> Cypherpunks repositories - gostls13.git/commitdiff
cmd/compile: fix checkptr handling of &^
authorMatthew Dempsky <mdempsky@google.com>
Thu, 20 Aug 2020 04:39:12 +0000 (21:39 -0700)
committerMatthew Dempsky <mdempsky@google.com>
Thu, 20 Aug 2020 17:48:29 +0000 (17:48 +0000)
checkptr has code to recognize &^ expressions, but it didn't take into
account that "p &^ x" gets rewritten to "p & ^x" during walk, which
resulted in false positive diagnostics.

This CL changes walkexpr to mark OANDNOT expressions with Implicit
when they're rewritten to OAND, so that walkCheckPtrArithmetic can
still recognize them later.

It would be slightly more idiomatic to instead mark the OBITNOT
expression as Implicit (as it's a compiler-generated Node), but the
OBITNOT expression might get constant folded. It's not worth the extra
complexity/subtlety of relying on n.Right.Orig, so we set Implicit on
the OAND node instead.

To atone for this transgression, I add documentation for nodeImplicit.

Fixes #40917.

Change-Id: I386304171ad299c530e151e5924f179e9a5fd5b8
Reviewed-on: https://go-review.googlesource.com/c/go/+/249477
Run-TryBot: Matthew Dempsky <mdempsky@google.com>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Keith Randall <khr@golang.org>
Reviewed-by: Cuong Manh Le <cuong.manhle.vn@gmail.com>
src/cmd/compile/internal/gc/syntax.go
src/cmd/compile/internal/gc/walk.go
src/runtime/checkptr_test.go
src/runtime/testdata/testprog/checkptr.go
test/fixedbugs/issue40917.go [new file with mode: 0644]

index b658410c53cd513e3772c7925ca155cf2bc7075a..47e5e59156c92074b224944491dca00b4450858c 100644 (file)
@@ -141,8 +141,8 @@ const (
        nodeInitorder, _                   // tracks state during init1; two bits
        _, _                               // second nodeInitorder bit
        _, nodeHasBreak
-       _, nodeNoInline // used internally by inliner to indicate that a function call should not be inlined; set for OCALLFUNC and OCALLMETH only
-       _, nodeImplicit
+       _, nodeNoInline  // used internally by inliner to indicate that a function call should not be inlined; set for OCALLFUNC and OCALLMETH only
+       _, nodeImplicit  // implicit OADDR or ODEREF; ++/-- statement represented as OASOP; or ANDNOT lowered to OAND
        _, nodeIsDDD     // is the argument variadic
        _, nodeDiag      // already printed error about this
        _, nodeColas     // OAS resulting from :=
index 8ae3d9a5c7bc599d80e44cb89ac7421fd8557411..74ed0411bd80b6f00b8537ac779e15775f5fb98d 100644 (file)
@@ -973,6 +973,7 @@ opswitch:
        case OANDNOT:
                n.Left = walkexpr(n.Left, init)
                n.Op = OAND
+               n.SetImplicit(true) // for walkCheckPtrArithmetic
                n.Right = nod(OBITNOT, n.Right, nil)
                n.Right = typecheck(n.Right, ctxExpr)
                n.Right = walkexpr(n.Right, init)
@@ -4003,8 +4004,12 @@ func walkCheckPtrArithmetic(n *Node, init *Nodes) *Node {
                case OADD:
                        walk(n.Left)
                        walk(n.Right)
-               case OSUB, OANDNOT:
+               case OSUB:
                        walk(n.Left)
+               case OAND:
+                       if n.Implicit() { // was OANDNOT
+                               walk(n.Left)
+                       }
                case OCONVNOP:
                        if n.Left.Type.Etype == TUNSAFEPTR {
                                n.Left = cheapexpr(n.Left, init)
index 8ab8a4937c2bedb97abbd700bf8259f3a75f633f..194cc1243a96ccca3f709e45af187d28ab8bd984 100644 (file)
@@ -27,6 +27,7 @@ func TestCheckPtr(t *testing.T) {
                {"CheckPtrAlignmentPtr", "fatal error: checkptr: misaligned pointer conversion\n"},
                {"CheckPtrAlignmentNoPtr", ""},
                {"CheckPtrArithmetic", "fatal error: checkptr: pointer arithmetic result points to invalid allocation\n"},
+               {"CheckPtrArithmetic2", "fatal error: checkptr: pointer arithmetic result points to invalid allocation\n"},
                {"CheckPtrSize", "fatal error: checkptr: converted pointer straddles multiple allocations\n"},
                {"CheckPtrSmall", "fatal error: checkptr: pointer arithmetic computed bad pointer value\n"},
        }
index 45e6fb1aa53f6c463ad7a8196439505372a00526..e0a2794f4c1da108a7883285a20526e3738bebed 100644 (file)
@@ -10,6 +10,7 @@ func init() {
        register("CheckPtrAlignmentNoPtr", CheckPtrAlignmentNoPtr)
        register("CheckPtrAlignmentPtr", CheckPtrAlignmentPtr)
        register("CheckPtrArithmetic", CheckPtrArithmetic)
+       register("CheckPtrArithmetic2", CheckPtrArithmetic2)
        register("CheckPtrSize", CheckPtrSize)
        register("CheckPtrSmall", CheckPtrSmall)
 }
@@ -32,6 +33,13 @@ func CheckPtrArithmetic() {
        sink2 = (*int)(unsafe.Pointer(i))
 }
 
+func CheckPtrArithmetic2() {
+       var x [2]int64
+       p := unsafe.Pointer(&x[1])
+       var one uintptr = 1
+       sink2 = unsafe.Pointer(uintptr(p) & ^one)
+}
+
 func CheckPtrSize() {
        p := new(int64)
        sink2 = p
diff --git a/test/fixedbugs/issue40917.go b/test/fixedbugs/issue40917.go
new file mode 100644 (file)
index 0000000..2128be5
--- /dev/null
@@ -0,0 +1,23 @@
+// run -gcflags=-d=checkptr
+
+// Copyright 2020 The Go Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style
+// license that can be found in the LICENSE file.
+
+package main
+
+import "unsafe"
+
+func main() {
+       var x [2]uint64
+       a := unsafe.Pointer(&x[1])
+
+       b := a
+       b = unsafe.Pointer(uintptr(b) + 2)
+       b = unsafe.Pointer(uintptr(b) - 1)
+       b = unsafe.Pointer(uintptr(b) &^ 1)
+
+       if a != b {
+               panic("pointer arithmetic failed")
+       }
+}