cjdb added inline comments.
================
Comment at: clang/test/Frontend/backend-attribute-error-warning-optimize.c:12
foo(); // expected-error {{call to 'foo' declared with 'error' attribute: oh
no foo}}
+ // expected-note@* {{In function 'baz'}}
if (x())
----------------
aaron.ballman wrote:
> nickdesaulniers wrote:
> > cjdb wrote:
> > > aaron.ballman wrote:
> > > > nickdesaulniers wrote:
> > > > > nickdesaulniers wrote:
> > > > > > aaron.ballman wrote:
> > > > > > > Instead of allowing this note to appear anywhere in the file, I
> > > > > > > think it's better to use "bookmark" comments. e.g.,
> > > > > > > ```
> > > > > > > void baz() { // #baz_defn
> > > > > > > }
> > > > > > >
> > > > > > > void foo() {
> > > > > > > baz(); // expected-note@#baz_defn {{whatever note text}}
> > > > > > > }
> > > > > > > ```
> > > > > > > so that we're testing where the diagnostic is emitted. (This is
> > > > > > > especially important given that the changes are about location
> > > > > > > tracking.)
> > > > > > oh, that's new (to me)! will do
> > > > > It looks like the "bookmarks" don't work because the notes do not
> > > > > line+col info. They follow the warning/error diagnostic which does,
> > > > > on the bottom most call site.
> > > > >
> > > > > The warning is supposed to be emitted on the callsite, not the
> > > > > definition.
> > > > I still don't think this is reasonable for test coverage because this
> > > > means we'll accept the note *anywhere* in the file. This makes it much
> > > > too easy to regress the behavior accidentally (e.g., accidentally emit
> > > > all the notes on line 1 of the file). I think we need *some* way to
> > > > nail down where these notes are emitted in the test. However, I might
> > > > be asking you to solve "please track location information through the
> > > > backend" for that, so perhaps this isn't a reasonable request?
> > > >
> > > > Also, CC @cjdb for awareness of how this kind of diagnostic is produced
> > > > (Chris is working on an idea for how we emit diagnostics so we get
> > > > better structured information from them, so knowing about this novel
> > > > approach might impact that idea).
> > > Very interesting, thanks for the heads up! Cross-phase diagnostics are
> > > definitely something I hadn't considered, and it **does** impact the
> > > design (but not in a derailing way).
> > I think we're back at "please track location information through the
> > backend".
> >
> > That is the tradeoff with this approach; not measurably regressing
> > performance when these attributes aren't used in source in exchange for
> > Note diagnostics that lack precise line+col info, but in practice provide
> > enough info for the user to understand what's going wrong where.
> >
> > Your call if the tradeoff is worth it.
> Here's my thinking, please correct any misunderstandings I have:
>
> * This functionality is primarily for use with `_FORTIFY_SOURCE` (but not
> solely for that purpose), and that's an important security feature used by
> glibc and the Linux kernel.
> * Security of C and C++ source code is Very Important, especially now that
> various gov't agencies [1][2] are suggesting to not use C or C++ for new
> projects specifically because the security posture of the languages and their
> tools.
> * Therefore, the ergonomics of this functionality are quite important for the
> intended use cases and the ecosystem as a whole.
> * Emitting only the function name but without location information does not
> give a good user experience, especially in circumstances where the function
> has multiple overloads, because it pushes the burden onto the programmer to
> figure out which functions are actually involved in the call chain. This
> issue is also present in C because of support for
> `__attribute__((overloadable))` and is not just a C++ concern.
> * The compile-time performance costs of tracking this location information
> are roughly 1%, and there are no runtime or binary size overhead costs unless
> other functionality is enabled (such as emitting debug info).
> * We can determine whether we need to enable this location tracking while
> building the AST when we see one of these two attributes being used, so we
> could enable this functionality selectively without burdening the user with
> enabling it manually via a flag. (We could still consider giving the user a
> flag to never track this even in the presence of the attributes if a user had
> a compelling use case for it.)
>
> If this is all reasonably accurate, I think it's worth seriously considering
> accepting the costs. I don't want to increase our compile time overhead, but
> at the same time, if ~1% is a "make or break" amount of compile-time
> performance to lose, we should be addressing *that* issue rather than
> hamstringing a user-facing diagnostic feature related to security. It's hard
> to argue "that CVE was totally worth it because we could then compile 1%
> faster". That said, perhaps others have a strong contrary opinion they'd like
> to argue in favor of?
>
> [1]
> https://media.defense.gov/2022/Nov/10/2003112742/-1/-1/0/CSI_SOFTWARE_MEMORY_SAFETY.PDF
> [2] https://doi.org/10.6028/NIST.IR.8397
>
My attitude is that we should prioritise ergonomics and usability over speed.
Yes, having to wait a little longer for stuff to build sucks, but there's a
clear ergonomics issue, which is motivation enough for me in this case (adding
the CVE argument is the cherry on top). Folks either aren't going to use a
feature if it's difficult to get right, or they're going to use it with large
amounts of stress (and I don't think this is fair).
Moreover, I think there may be some opportunities we can look into to cancel
out this pessimisation.
Repository:
rG LLVM Github Monorepo
CHANGES SINCE LAST ACTION
https://reviews.llvm.org/D141451/new/
https://reviews.llvm.org/D141451
_______________________________________________
cfe-commits mailing list
[email protected]
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits