Chromium Code Reviews| Index: native_client_sdk/src/doc/reference/pnacl-undefined-behavior.rst |
| diff --git a/native_client_sdk/src/doc/reference/pnacl-undefined-behavior.rst b/native_client_sdk/src/doc/reference/pnacl-undefined-behavior.rst |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..30d95f91fbf2ddbc21648d30e824af3c5fcdc638 |
| --- /dev/null |
| +++ b/native_client_sdk/src/doc/reference/pnacl-undefined-behavior.rst |
| @@ -0,0 +1,221 @@ |
| +======================== |
| +PNaCl Undefined Behavior |
| +======================== |
| + |
| +.. contents:: |
| + :local: |
| + :backlinks: none |
| + :depth: 3 |
| + |
| +.. _undefined_behavior: |
| + |
| +Overview |
| +======== |
| + |
| +C and C++ undefined behavior allows efficient mapping of the source |
| +language onto hardware, but leads to different behavior on different |
| +platforms. |
| + |
| +PNaCl exposes undefined behavior in the following ways: |
| + |
| +* The Clang frontend and optimizations that occur on the developer's |
| + machine determine what behavior will occur, and it will be specified |
| + deterministically in the *pexe*. All targets will observe the same |
| + behavior. In some cases, recompiling with a newer PNaCl SDK version |
| + will either: |
| + |
| + * Reliably emit the same behavior in the resulting *pexe*. |
| + * Change the behavior that gets specified in the *pexe*. |
| + |
| +* The behavior specified in the *pexe* relies on PNaCl's bitcode, |
| + runtime or CPU architecture vagaries. |
| + |
| + * In some cases, the behavior using the same PNaCl translator version |
| + on different architectures will produce different behavior. |
| + * Sometimes runtime parameters determine the behavior, e.g. memory |
| + allocation determines which out-of-bounds accesses crash versus |
| + returning garbage. |
| + * In some cases, different versions of the PNaCl translator |
| + (i.e. after a Chrome update) will compile the code differently and |
| + cause different behavior. |
| + * In some cases, the same versions of the PNaCl translator, on the |
| + same architecture, will generate a different *nexe* for |
| + defense-in-depth purposes, but may cause code that reads invalid |
| + stack values or code sections on the heap to observe these |
| + randomizations. |
| + |
| +Specification |
| +============= |
| + |
| +PNaCl's goal is that a single *pexe* should work reliably in the same |
| +manner on all architectures, irrespective of runtime parameters and |
| +through Chrome updates. This goal is unfortunately not attainable; PNaCl |
| +therefore specifies as much as it can and outlines areas for |
| +improvement. |
| + |
| +One interesting solution is to offer good support for LLVM's sanitizer |
| +tools (including `UBSan |
| +<http://clang.llvm.org/docs/UsersManual.html#controlling-code-generation>`_) |
| +at development time, so that developers can test their code against |
| +undefined behavior. Shipping code would then still get good performance, |
| +and diverging behavior would be rare. |
| + |
| +Note that none of these issues are vulnerabilities in PNaCl and Chrome: |
| +the NaCl sandboxing still constrains the code through Software Fault |
| +Isolation. |
| + |
| +Behavior in PNaCl Bitcode |
| +========================= |
| + |
| +Well-Defined |
| +------------ |
| + |
| +The following are traditionally undefined behavior in C/C++ but are well |
| +defined at the *pexe* level: |
| + |
| +* Dynamic initialization order dependencies: the order is deterministic |
| + in the *pexe*. |
| +* Bool which isn't ``0``/``1``: the bitcode instruction sequence is |
| + deterministic in the *pexe*. |
| +* Out-of-range ``enum`` value: the backing integer type and bitcode |
| + instruction sequence is deterministic in the *pexe*. |
| +* Aggressive optimizations based on type-based alias analysis: TBAA |
| + optimizations are done before stable bitcode is generated and their |
| + metadata is stripped from the *pexe*; behavior is therefore |
| + deterministic in the *pexe*. |
| +* Operator and subexpression evaluation order in the same expression |
| + (e.g. function parameter passing, or pre-increment): the order is |
| + defined in the *pexe*. |
| +* Signed integer overflow: two's complement integer arithmetic is |
| + assumed. |
| +* Atomic access to a non-atomic memory location (not declared as |
| + ``std::atomic``): atomics and ``volatile`` variables all lower to the |
| + same compatible intrinsics or external functions; the behavior is |
| + therefore deterministic in the *pexe* (see :ref:`Memory Model and |
| + Atomics <memory_model_and_atomics>`). |
| +* Integer divide by zero: always raises a fault (through hardware on |
| + x86, and through integer divide emulation routine or explicit checks |
| + on ARM). |
| + |
| +Not Well-Defined |
| +---------------- |
| + |
| +The following are traditionally undefined behavior in C/C++ which also |
| +exhibit undefined behavior at the *pexe* level. Some are easier to fix |
| +than others. |
| + |
| +Potentially Fixable |
| +^^^^^^^^^^^^^^^^^^^ |
| + |
| +* Shift by greater-than-or-equal to left-hand-side's bit-width or |
| + negative (see `bug 3604 |
| + <https://code.google.com/p/nativeclient/issues/detail?id=3604>`_). |
| + |
| + * Some of the behavior will be specified in the *pexe* depending on |
| + constant propagation and integer type of variables. |
| + * There is still some architecture-specific behavior. |
| + * PNaCl could force-mask the right-hand-side to `bitwidth-1`, which |
| + could become a no-op on some architectures while ensuring all |
| + architectures behave similarly. Regular optimizations could also be |
| + applied, removing redundant masks. |
| + |
| +* Using a virtual pointer of the wrong type, or of an unallocated |
| + object. |
| + |
| + * Will produce wrong results which will depend on what data is treated |
| + as a `vftable`. |
| + * PNaCl could add runtime checks for this, and elide them when types |
| + are provably correct (see this CFI `bug 3786 |
| + <https://code.google.com/p/nativeclient/issues/detail?id=3786>`_). |
| + |
| +* Some unaligned load/store (see `bug 3445 |
| + <https://code.google.com/p/nativeclient/issues/detail?id=3445>`_). |
| + |
| + * Could force everything to `align 1`; performance cost should be |
| + measured. |
| + * The frontend could also be more pessimistic when it sees dubious |
| + casts. |
| + |
| +* Some values can be marked as ``undef`` (see `bug 3796 |
| + <https://code.google.com/p/nativeclient/issues/detail?id=3796>`_). |
| + |
| +* Reaching end-of-value-returning-function without returning a value: |
| + reduces to ``ret i32 undef`` in bitcode. This is mostly-defined, but |
| + could be improved (see `bug 3796 |
| + <https://code.google.com/p/nativeclient/issues/detail?id=3796>`_). |
| + |
| +* Reaching “unreachable” code. |
| + |
| + * LLVM provides an IR instruction called “unreachable” whose effect |
| + will be undefined. PNaCl could change this to always trap, as the |
| + ``llvm.trap`` intrinsic does. |
| + |
| +* Zero or negative-sized variable-length array (and ``alloca``) aren't |
| + defined behavior. PNaCl's frontend or the translator could insert |
| + checks with ``-fsanitize=vla-bound``. |
| + |
| +.. _undefined_behavior_fp: |
| + |
| +Floating-Point |
| +^^^^^^^^^^^^^^ |
| + |
| +PNaCl offers a IEEE-754 implementation which is as correct as the |
| +underlying hardware allows, with a few limitations. These are a few |
| +sources of undefined behavior which are believed to be fixable: |
| + |
| +* Float cast overflow is currently undefined. |
| +* Float divide by zero is currently undefined. |
|
jvoung (off chromium)
2014/02/21 22:59:47
That's a bit unfortunate since frem div by zero is
JF
2014/02/21 23:13:25
Yeah this is more about whether FPU control bits a
|
| +* The default denormal behavior is currently unspecified, which isn't |
| + IEEE-754 compliant (denormals must be supported in IEEE-754). PNaCl |
| + could mandate flush-to-zero, and may give an API to enable denormals |
| + in a future release. The latter is problematic for SIMD and |
| + vectorization support, where some platforms do not support denormal |
| + SIMD operations. |
| +* ``NaN`` values are currently not guaranteed to be canonical; see `bug |
| + 3536 <https://code.google.com/p/nativeclient/issues/detail?id=3536>`_. |
| +* Passing ``NaN`` to STL functions (the math is defined, but the |
| + function implementation isn't, e.g. ``std::min`` and ``std::max``), is |
| + well-defined in the *pexe*. |
| + |
| +Hard to Fix |
| +^^^^^^^^^^^ |
| + |
| +* Null pointer/reference has behavior determined by the NaCl sandbox: |
| + |
| + * Raises a segmentation fault in the bottom ``64KiB`` bytes on all |
| + platforms, and on some sandboxes there are further non-writable |
| + pages after the initial ``64KiB``. |
| + * Negative offsets aren't handled consistently on all platforms: |
| + x86-64 and ARM will wrap around to the stack (because they mask the |
| + address), whereas x86-32 will fault (because of segmentation). |
| + |
| +* Accessing uninitialized/free'd memory (including out-of-bounds array |
| + access): |
| + |
| + * Might cause a segmentation fault or not, depending on where memory |
| + is allocated and how it gets reclaimed. |
| + * Added complexity because of the NaCl sandboxing: some of the |
| + load/stores might be forced back into sandbox range, or eliminated |
| + entirely if they fall out of the sandbox. |
| + |
| +* Executing non-program data (jumping to an address obtained from a |
| + non-function pointer is undefined, can only do ``void(*)()`` to |
| + ``intptr_t`` to ``void(*)()``). |
| + |
| + * Just-In-Time code generation is supported by NaCl, but is not |
| + currently supported by PNaCl. It is currently not possible to mark |
| + code as executable. |
| + * Offering full JIT capabilities would reduce PNaCl's ability to |
| + change the sandboxing model. It would also require a "jump to JIT |
| + code" syscall (to guarantee a calling convention), and means that |
| + JITs aren't portable. |
| + * PNaCl could offer "portable" JIT capabilities where the code hands |
| + PNaCl some form of LLVM IR, which PNaCl then JIT-compiles. |
| + |
| +* Out-of-scope variable usage: will produce unknown data, mostly |
| + dependent on stack and memory allocation. |
| +* Data races: any two operations that conflict (target overlapping |
| + memory), at least one of which is a store or atomic read-modify-write, |
| + and at least one of which is not atomic: this will be very dependent |
| + on processor and execution sequence, see :ref:`Memory Model and |
| + Atomics <memory_model_and_atomics>`. |