[cfe-dev] [Analyzer] Equality of pointers

Ádám Balogh via cfe-dev cfe-dev at lists.llvm.org
Fri Jun 14 05:13:50 PDT 2019


Hello,

Thank you for your answer.

I fully agree that this is a very difficult problem. Ideally the best solution would be a perfect region store and constraint solver, but we will not have it in the near future. So I accept your proposed approach.

However, I have some questions before starting a prototype solution. First of all I cannot find the code that rearranges comparisons of symbolic regions. My rearrangement patch only works if the analyzer option is enabled which is not. Furthermore it only works for symbols with constrained ranges. Where else are comparisons rearranged?

It is also not completely clear for me where to put the code that generates the sink and restarts the analysis? (I am also not sure how to restart the analysis for the current function.) Where to record the aliasing? Maybe keep that record in the GDM for the restarted analysis and make SymbolManager look there for aliased pointers? I think the heuristics are the last to insert once the prototype is working.

Regards,

Ádám

From: Artem Dergachev <noqnoqneo at gmail.com>
Sent: 2019. június 10., hétfő 5:31
To: Gábor Horváth <xazax.hun at gmail.com>; Ádám Balogh <adam.balogh at ericsson.com>; Artem Dergachev <adergachev at apple.com>
Cc: cfe-dev at lists.llvm.org
Subject: Re: [cfe-dev] [Analyzer] Equality of pointers

I believe in our current situation we should simply generate a sink whenever we discover symbolic pointer aliasing, because RegionStore always implicitly assumes that there's no aliasing. Eg., consider:

  void example1(int *x, int *y) {
    *x = 1; // (SymRegion{reg_$1<x>}, 0, direct): 1 S32b
    *y = 2; // (SymRegion{reg_$2<y>}, 0, direct): 2 S32b
    if (x == y) {
      // ???
    }
  }

The correct way to model the then-branch of the if-statement is to figure out which of the bindings is *newer* and keep it; in this case it'll mean dropping the binding of 'x' and keeping the binding of 'y'. This would mean that the value of the common pointee of 'x' and 'y' would be equal to 2. However, in its current shape RegionStore simply does not track history of bindings. We can make it track the history, but it'll be a ridiculously complex data structure - and even the current simple structure is so complicated and messy that nobody understands how it works.

All right, suppose we make a new Store implementation that'll handle aliasing perfectly and is otherwise perfect in every way. Suppose we also have a perfect constraint solver that knows that in the following code

  void example2(int *x, int *y) {
    if (*x > 5)
      if (*y < 10)
        if (x == y) {
          // ???
        }
  }

the valid constraint range for the common pointee of 'x' and 'y' would be [6, 9] (this won't be immediately solved by the Z3 solver because heap shape information still needs to be stuffed into it). Now, how about these examples?:

  void example3(int *x, int *y) {
    delete x;
    if (x == y) {
      // ???
    }
  }

  void example4(int *x, int *y) {
    delete x;
    delete y;
    if (x == y) {
      // ???
    }
  }

In example 3 the common pointee would be deleted. It'd cause a warning if 'y' is used later. In example 4 it's an outright retroactive double-free. We need to modify MallocChecker to handle both of these cases correctly.

If the same happens to RetainCountChecker, we'll need to *add* reference counts of the two pointers together. That's already a large variety of very non-trivial operations that we need to perform. How about aliasing file descriptors (which aren't even necessarily pointers)? How about aliasing two mutexes one of which is locked and the other is unlocked? How much completely non-trivial and non-reusable code do we need to write in dozens of checkers to solve this problem, given that we can barely solve it for RegionStore?

===========

What we *can* do, however, is to not only generate the sink, but *restart* the analysis from the beginning, assuming that the two pointers point to the same memory from the start. Say, force the SymbolManager that's owned by this analysis's ExprEngine to produce reg_$1<x> whenever it's asked for reg_$2<y>. This would make sure that we don't make wrong assumptions in the first place, so that we didn't have to undo them in the middle of the analysis. This wouldn't require much checker-side support, so it'll be much more in the spirit of the Analyzer. And it's also much easier to implement. As usual, we'll need some heuristics to make sure we don't exponentially explode on the number of different combinations of pointers that can potentially alias.

On 05.06.2019 05:23, Gábor Horváth via cfe-dev wrote:
Hi!
This is an excellent point and it is not easy to solve. One of the reason why your original idea is hard to implement is the following. Let's look at the code snippet below:
void f(int *p, int *q) {
  int *p2 = p + 2;
  if (p == q) {
    // Here we learned something new about p2 as well.
    // So we might need to update all the symbolic expressions and bindings, not just p.
  }
}
I think your second idea should work well, but I have no idea about the performance implications. As a starting point we could implement your second solution and do some benchmarks both performance wise and looking at the results from some open source projects to see what happens to the false positive rate.
Out of curiosity, do we have the same problems with invalidations?
I am sure Artem will have some more to add but as far as I know he is busy with WWDC this week.

Regards,
Gabor

On Tue, 4 Jun 2019 at 14:53, Ádám Balogh via cfe-dev <cfe-dev at lists.llvm.org<mailto:cfe-dev at lists.llvm.org>> wrote:
Hello,

This is not the first time that we are facing the following problem.

Given a code that clears all non-sentinel elements from a circular double-linked list with sentinel element:

typedef struct ListNode {
  struct ListNode *next;
  struct ListNode *prev;
  void *data;
} ListNode;

void ListClear(ListNode *list) {
  while (list->next != list) {
    ListNode *node = list->next;

    node->next->prev = node->prev;
    node->prev->next = node->next;

    node->next = NULL;
    node->prev = NULL;

    free(node);
  }
}

unix.Malloc Use after free is reported in the second iteration of the loop for `node`.

This is not necessarily a false positive if analyzed top level. The function that clears the nodes of the list implicitly assumes that it is a consistent circular double-linked list with a sentinel node. However this invariant is not ensured anywhere inside the function. It is thus not known that the `prev` pointer of the first non-sentinel node points back to the sentinel node, neither is it known that applying a `prev` and a `next` after each other in any order leads back to the original node. Without these invariants the analyzer cannot know that after unlinking and freeing the first non-sentinel element and then taking again the first non-sentinel element is not equal to the original sentinel element. So it assumes that they are equal and used again after freeing its memory space. Thus from the perspective of the standalone function it can be a use-after-free situation.

So I fixed the function by inserting assertions to ensure the invariant:

void ListClear(ListNode *list) {
  while (list->next != list) {
    ListNode *node = list->next;

    assert(node->prev == list);
    assert(node->next->prev == node);
    assert(node->prev->next == node);

    node->next->prev = node->prev;
    node->prev->next = node->next;

    node->next = NULL;
    node->prev = NULL;

    free(node);
  }
}

However, it did not help because the analyzer cannot handle equality of pointers correctly. If we have an assumption that two pointers are equal the analyzer still creates two symbolic regions and records a constraint that the symbols of the symbolic regions are equal. Later this constraint can be used for deciding whether they are equal or not but it does not handle them as the same region. So if we change the pointer `node->prev->next` to `node->next` then `node->prev->next` is changed but `list->next` not even if we assumed that they are the same. That is the reason the analyzer takes the freed region again in the next iteration of the loop and reports an error.

A strange thing is that the constraint manager rearranges the comparison of the two symbols (of the symbolic regions) to a difference without `aggressive-binary-operation-simplification` disabled. (It should not do it even if this option is enabled since the ranges of symbolic values are not constrained to `MAX/4` of the type.)

The question is how to fix this. I think that if two pointers are the same, then they must point to exactly the same memory region which means exactly the same symbol if it is a symbolic region. Thus instead of assigning `$reg2` to `node->prev` and recording whether the range of `$reg2-$reg0` is `[0..0]` the analyzer should assign `$reg0` to `node->prev` which is the region of `list`. Similarly, `node->next->prev` should not become `$reg7` where the range of `$reg7-$reg1` is `[0..0]` and `node->prev->next ` should not become `$reg11` where the range of `$reg11-$reg1` is `[0..0]` but both should become `$reg1`. This way when we unlink `node` `node->next->prev` becomes `reg0` (thus the region of `list`) and `node->prev->next` e.g. `$reg2`. This way in the next iteration `node->next` is `$reg2` instead of the freed `$reg1` so the false warning goes away. Of course I know this is not easy to implement. If both pointers already have regions assigned then which one to chose and how to replace the other one?

Another solution could be iterating all the existing regions upon bindings and do the same binding to the regions equal to the affected region. (I hope I managed to express myself clearly enough here.)

This is an old weakness of the Analyzer which should be solved eventually because it causes false positives. A new constraint manager does not help because the problem is not there.

Any ideas?

Regards,

Ádám



_______________________________________________
cfe-dev mailing list
cfe-dev at lists.llvm.org<mailto:cfe-dev at lists.llvm.org>
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-dev<https://protect2.fireeye.com/url?k=e2ffb2bd-be2bb821-e2fff226-8631fc8bdea5-f226057ee94a7815&q=1&u=https%3A%2F%2Flists.llvm.org%2Fcgi-bin%2Fmailman%2Flistinfo%2Fcfe-dev>



_______________________________________________

cfe-dev mailing list

cfe-dev at lists.llvm.org<mailto:cfe-dev at lists.llvm.org>

https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-dev<https://protect2.fireeye.com/url?k=561e6cb0-0aca662c-561e2c2b-8631fc8bdea5-1cb071bdb1502412&q=1&u=https%3A%2F%2Flists.llvm.org%2Fcgi-bin%2Fmailman%2Flistinfo%2Fcfe-dev>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/cfe-dev/attachments/20190614/7c9c69a7/attachment.html>


More information about the cfe-dev mailing list