-
Notifications
You must be signed in to change notification settings - Fork 17.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cmd/compile: incorrect assignment to uint64 via pointer converted to *uint16 (new in 1.7) #16769
Comments
Unsafe code, not a compiler bug. It would be a minor bit of a work to fix this, and a larger bit of work to fix this in a way that did not leave useless local-zeroing in the code for correctly-written unsafe code. |
@dr2chase Can you clarify what's incorrect about @kelseyfrancis's code? It looks valid to me. |
var x uint64
*(*uint16)(unsafe.Pointer(&x)) = 0xffee That's treating a uint64 as a uint16. |
Right, I see that. What's invalid about that? I don't recall package unsafe ever saying type punning like that isn't allowed in Go. |
Package unsafe has also never promised it is valid. As @randall77 has said elsewhere, we're allowed to change the unsafe behavior between releases because because it makes no promises. https://golang.org/doc/go1compat even says:
|
Fair enough. Incidentally, explicit initialization of var x uint64 = 0x1020304050607080
*(*uint16)(unsafe.Pointer(&x)) = 0xffee
fmt.Printf("%x\n", x) // prints c42000ffee rather than 102030405060ffee |
https://golang.org/pkg/unsafe/#Pointer says:
My interpretation of "equivalent memory layout" is referring to having the same pointer slots. Since If not, we should clarify the documentation to define "memory layout". That term isn't used in the Go language spec or memory model. |
Reopening because at the very least I think there's a documentation issue here. |
We should fix this. The failure mode is bad - I believe we're exposing uninitialized stack memory this way. That's a (very minor, but still) security bug. |
Workaround is to assign the local to a global sink before the unsafe use; this will force the zeroing to occur. |
Just treat unsafe stores as not real stores, and thus no redundant store elimination? Keith, how can use of unsafe not be a security violation in general? |
+1 on @dr2chase's point on security. Anyway, I send CL https://go-review.googlesource.com/c/27320/. |
CL https://golang.org/cl/27320 mentions this issue. |
If we're revising the documentation for unsafe, can we make it a lot scarier and with even fewer things that look like promises? |
@dr2chase I thought the only promise was "We promise to occasionally break your use of |
|
Package unsafe documents several patterns that users are allowed to assume will remain safe, one of which includes (at least by my best interpretation) converting
That's not one of the patterns that are documented to be safe. Conversion of
Do you mean that the pre-SSA compiler didn't support conversions from |
I think that we should not be bound by any particular artifacts of the previous compiler's treatment of unsafe code, because the full set of those artifacts is not specified. I also think it was a mistake to "document" this behavior for end-user use, because people will write unsafe code that happens to pass tests with a particular Go release and believe that therefore they got it right. We don't have a test suite for what unsafe behavior we support except for the runtime itself, and compiler writers aren't good at imaging the crazy things that people might do with unsafe code. And lacking such a test suite, for unsafe, I think it's fine for compiler-writers to push back hard on "bugs" involving unsafe code. Unsafe code is generally a security violation, because no matter what we say in documentation, we don't check it mechanically. It's pretty much the whole point of actual security violations that they do an end-run on documented restrictions. Or as I asked, "what prevents?" |
Closing because this is fixed on master. Per new release policy, a separate issue will track cherry-picking for Go 1.7.1. |
@mdempsky, just curious what is the new issue number or has it not been created yet? |
@randall77, we're getting stuck cherry-picking this to the Go 1.7 branch. It seems to depend on some earlier stuff. Rather than @broady and I botch it, can you prepare a version of the fix for the 1.7 release branch? |
https://go-review.googlesource.com/28670 (manual cherrypick of 27320 into release-branch.go1.7) out for review. |
What version of Go are you using (
go version
)?go version go1.7 darwin/amd64
andgo version go1.7 linux/amd64
.This issue is not present in
go1.6.2
.What operating system and processor architecture are you using (
go env
)?and
What did you do?
Assign a
uint16
(oruint32
) to a previously unuseduint64
via converted pointer on a little-endian architecture.go run
the following program:What did you expect to see?
What did you see instead?
A test that passes with Go 1.6 but not with Go 1.7:
The text was updated successfully, but these errors were encountered: