From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-qk1-x741.google.com (mail-qk1-x741.google.com [IPv6:2607:f8b0:4864:20::741]) by sourceware.org (Postfix) with ESMTPS id 3ADAA3840C0F for ; Sun, 28 Jun 2020 23:08:03 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.3.2 sourceware.org 3ADAA3840C0F Received: by mail-qk1-x741.google.com with SMTP id l6so13769116qkc.6 for ; Sun, 28 Jun 2020 16:08:03 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:subject:to:cc:references:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=2lu0VRpLHyEUCuB1Ast6CDGoQKq5m0onL3pP6XyyuHw=; b=LUhLI8DU63whqHO7erGZwG/rb/ZF01o7/nGLt9Ewyyt1fDyrskAeCrnjWGTHP2N+ep DRPbd0TK5pkDAbmXyOmKkP6+DCFv/BYe26YAW2883NQA/HQGF5uyEPVYJnv9CROhNjMX y0WzVqJtGP3WFJ8KZbToHWIUz/SHN120nSU73nymCbnHlkebhilLrNXFnOoqFQtNptaI IWOp0Wy50dyq52zAAFC0qbuZE8ZTpIX+EPw2CBaOk2bn9yKNtkDNq3uwwpP6CLn+UwxH oNZwfS7+ZhqPnWjWNdY/3XB01tnf3xLgz2MLWGEH1u0lLWdjbv/Snr9fK/k0DyZSiDSj cUEQ== X-Gm-Message-State: AOAM533A8MqEmgtSDE/evDbtbzvESeWRMpJ+JV/342sM4ABuPaFxcFdK BIr4Ugghvf0oHbTlDWreKulll8jA X-Google-Smtp-Source: ABdhPJy2fUISebbYUzr/g0ZfPoBZo35sE+C2SFR+65F5IZgZV4i9DeETN+oovlaqi0fbtBPnJaP3dQ== X-Received: by 2002:a05:620a:14b6:: with SMTP id x22mr11981325qkj.448.1593385681499; Sun, 28 Jun 2020 16:08:01 -0700 (PDT) Received: from [192.168.0.41] (184-96-233-25.hlrn.qwest.net. [184.96.233.25]) by smtp.gmail.com with ESMTPSA id s8sm1386165qtc.17.2020.06.28.16.08.00 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 28 Jun 2020 16:08:00 -0700 (PDT) From: Martin Sebor Subject: Re: [PATCH] handle MEM_REF with void* arguments (PR c++/95768) To: Richard Biener Cc: Jason Merrill , gcc-patches References: <29c9b3fa-69a2-dca9-1477-54aac80c8680@gmail.com> Message-ID: <5b4805a5-1949-267c-dc40-6f084349a68b@gmail.com> Date: Sun, 28 Jun 2020 17:07:59 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FREEMAIL_FROM, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_PASS, TXREP autolearn=ham autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 28 Jun 2020 23:08:04 -0000 On 6/23/20 1:12 AM, Richard Biener wrote: > On Tue, Jun 23, 2020 at 12:22 AM Martin Sebor via Gcc-patches > wrote: >> >> On 6/22/20 12:55 PM, Jason Merrill wrote: >>> On 6/22/20 1:25 PM, Martin Sebor wrote: >>>> The attached fix parallels the one for the equivalent C bug 95580 >>>> where the pretty printers don't correctly handle MEM_REF arguments >>>> with type void* or other pointers to an incomplete type. >>>> >>>> The incorrect handling was exposed by the recent change to >>>> -Wuninitialized which includes such expressions in diagnostics. >>> >>>> + if (tree size = TYPE_SIZE_UNIT (TREE_TYPE (argtype))) >>>> + if (!integer_onep (size)) >>>> + { >>>> + pp_cxx_left_paren (pp); >>>> + dump_type (pp, ptr_type_node, flags); >>>> + pp_cxx_right_paren (pp); >>>> + } >>> >>> Don't we want to print the cast if the pointer target type is incomplete? >> >> I suppose, yes, although after some more testing I think what should >> be output is the type of the access. The target pointer type isn't >> meaningful (at least not in this case). >> >> Here's what the warning looks like in C for the test case in >> gcc.dg/pr95580.c: >> >> warning: ‘*((void *)(p)+1)’ may be used uninitialized >> >> and like this in C++: >> >> warning: ‘*(p +1)’ may be used uninitialized >> >> The +1 is a byte offset, which is correct given that incrementing >> a void* in GCC is the same as adding 1 to the byte address, but >> dereferencing a void* doesn't correspond to what's going on in >> the source. >> >> Even for a complete type (with size greater than 1), printing >> the type of the argument plus a byte offset is wrong. It ends >> up with this for the C++ test case from 95768: >> >> warning: ‘*((int*) +4)’ is used uninitialized >> >> when the access is actually ‘*((int*) +1)’ >> >> So it seems to me for MEM_REF, to make the output meaningful, >> it's the type of the access (i.e., the MEM_REF type) that should >> be printed here, and the offset should either be in elements of >> the accessed type, i.e., >> >> warning: ‘*((int*) +1)’ is used uninitialized >> >> or, if the access is misaligned, the argument should first be >> cast to char*, the offset added, and the result then cast to >> the access type, like this: >> >> warning: ‘*(T*)((char*) +1)’ is used uninitialized >> >> The attached revised and less than fully tested patch implements >> this for C++ only for now. If we agree on this approach I'll see >> about making the corresponding change in C. > > Note that there is no C/C++ way of fully expressing MEM_REF > semantics. __MEM ((T *)p + 1) is not actually > *(int *)((char *)p + 1) because that does not reflect that the > effective type of the lvalue when TBAA is concerned is 'T' > rather than 'int'. What form would you say is closest to the C/C++ semantics, or likely the most useful to users, that GCC could print instead? > Note for MEM_REF the offset is always > a constant byte offset but it indeed does not have to be a > multiple of the MEM_REF type size. > > I wonder whether printing the MEM_REF in full provides > any real diagnostic value in the more "obfuscated" cases. I'm not sure what obfuscated cases you're thinking of, or what you mean by printing it in full. I instrumented the code to print every MEM_REF in that comes up in warn_uninitialized_vars and rebuilt GCC. There are 17,456 distinct instances so I didn't review them all but those I did look at all look reasonable. Probably the least useful are those that mention by itself (i.e., or *). Those with an offset are more informative (e.g., *((access**) +1). In a few the offset is very large, such as *((unsigned int*)sp +4611686018427387900), but that doesn't seem like a problem. I'd be happy to share the result. > > I'd also not print but . I also don't find helpful, but I don't see as an improvement. I think printing the SSA variable would be more informative here since its name is usually related to the variable it was derived from in the source. But making that change (or any other like it) feels like too much feature creep for this fix. I'd be happy to do it in a follow up if we agree it's a good idea. Either way, please let me know if the patch is okay as is or, if not, what type it should mention. Martin