Modeling the Invariance of Virtual Pointers in LLVM

Total Page:16

File Type:pdf, Size:1020Kb

Modeling the Invariance of Virtual Pointers in LLVM Modeling the Invariance of Virtual Pointers in LLVM Piotr Padlewski Krzysztof Pszeniczny Richard Smith Google Research Google Research Google Research [email protected] [email protected] [email protected] Abstract Indirect calls also limit the extent of compiler analyses and optimizations, making it much more difficult to Devirtualization is a compiler optimization that replaces perform inter-procedural reasoning and thus hinder many indirect (virtual) function calls with direct calls. It is useful intra-procedural optimizations, e.g. inlining, intra- particularly effective in object-oriented languages, such procedural register allocation, constant propagation or as Java or C++, in which virtual methods are typically function attributes inference. abundant. Modeling the lifetime of a C++ pointer in the LLVM We present a novel abstract model to express the life- IR is nontrivial, because bit-wise equal C++ pointers, times of C++ dynamic objects and invariance of virtual viz. having the same bit pattern, may nevertheless table pointers in the LLVM intermediate representation. denote objects with different lifetimes. They are thus The model and the corresponding implementation in not equivalent and cannot be replaced with each other. Clang and LLVM enable full devirtualization of virtual However, this information is not reflected in the LLVM calls whenever the dynamic type is statically known and IR, because equal values are interchangeable there. The elimination of redundant virtual table loads in other following C++ code, when translated to the LLVM IR cases. and optimized1, makes the issue apparent: Due to the complexity of C++, this has not been achieved 1 void test() { by any other C++ compiler so far. Although our model 2 auto*a= newA; 3 external_fun(a); was designed for C++, it is also applicable to other 4 languages that use virtual dispatch. Our benchmarks 5 A* b = new(a) B; 6 external_fun(b); show an average of 0.8% performance improvement on 7 } real-world C++ programs, with more than 30% speedup in some cases. The implementation is already a part of 1 define void @test() { 2 %new= call i8* @NEW(i64 8) the upstream LLVM/Clang and can be enabled with the 3 %a= bitcast i8* %1 to %struct.A* -fstrict-vtable-pointers flag. 4 call void @A_CTOR(%struct.A* %a) 5 call void @external_fun(%struct.A* %a) 6 %b= bitcast i8* %1 to %struct.B* Keywords: devirtualization, invariant, virtual pointer, 7 call void @B_CTOR(%struct.B* %b) 8 ; Because %a and %b are known to be equal, indirect call, fat pointer 9 ; the compiler decided to use %a. 10 call void @external_fun(%struct.A* %a) 11 ret void 1 Introduction 12 } Devirtualization is a compiler optimization that changes Here, the so-called “placement new” was used to con- arXiv:2003.04228v1 [cs.PL] 22 Feb 2020 virtual (dynamic) calls to direct (static) calls. The former struct a new object in pre-allocated memory (here: in the introduce a performance penalty compared to the latter, memory pointed by a). As can be seen in this example, as they cannot be inlined and are harder to speculatively %a is passed to the second call of external_fun instead execute. of %b, as the compiler figured out that they are equiva- lent. On the other hand, if external_fun(b) had been Indirect calls can also serve as an attack vector if an replaced with external_fun(a), the behavior would be adversary can replace the virtual pointer of an object, undefined per the C++ standard. e.g. by performing buffer overflow. Moreover, a recently discovered vulnerability called Spec- In this paper, we present a novel way to model C++ tre [13, 17] showed that the indirect branch predictor is dynamic objects’ lifetimes in LLVM capable of leveraging susceptible to side-channel attacks where observable side their virtual pointer’s invariance to aid devirtualization. effects could lead to private data leakage. The currently 1The LLVM IR code was simplified to make it clearer. Mangled used mitigation technique (the so-called ‘retpolines’ [26]) names, types or unimportant attributes will be similarly simplified effectively eliminates indirect branch prediction entirely. in other listings. 1 Piotr Padlewski, Krzysztof Pszeniczny, and Richard Smith This is a previously unresolved problem, blocking the Similar optimizations can be also achieved using just-in- wide deployment of devirtualization techniques. time compilation. However, it is rarely used in the case of C++. Another technique is to leverage the invariance of a 2 Related Work virtual pointer and having loaded the pointer once, reuse it for multiple virtual calls, or even devirtualize all virtual There are multiple optimizations done in hardware that calls if the dynamic type of object is statically known. speed up the execution of virtual calls. The most im- The latter holds e.g. for automatic objects in C++. portant one is the indirect branch predictor that makes In Java, the virtual pointer is set only once in the most speculative execution of indirect calls possible. More- derived constructor. There is also no mechanism for over, some CPU architectures provide store buffers [11, changing the dynamic type of an existing object, and 11.10 Store Buffer] [4, 2.4.5.2 L1 DCache] [2, 8.5.1. the lack of manual memory management means that no Store buffer] [18], which temporarily hold writes before reference ever points to a dead object. Hence, one can committing them to memory. When a load operation is simply inform the optimizer that virtual pointers are performed, the CPU returns a value from the store buffer invariant. This technique was used in Falcon [9, 24]– if it exists for the given address. Thus, after construction an LLVM-based Java JIT compiler, resulting in 10-20% of an object, as long as its virtual pointer’s value is in speedups2. the store buffer, loading it is more efficient. Moreover, some LLVM front-ends decided to create a Additionally, there are also multiple software techniques richer language-specific intermediate language used be- used for devirtualization. Speculative devirtualization [14, tween abstract syntax tree and the LLVM IR, such as 15] introduces direct calls to known implementations by SIL (Swift), MIR (Rust), or Julia IR (Julia). Unfortu- guarding them with comparisons of virtual pointers or nately, Clang translates its AST directly to the LLVM virtual function pointers. This enables inlining and re- IR. lies on the branch predictor instead of the indirect call Previous experimental LLVM-based models [19–22] that predictor, which is more accurate especially on older tried to express lifetime of pointers to dynamic objects architectures. However, only implementations visible were unfortunately flawed. They failed to prevent the in the current translation unit can be speculated. An the compiler from being easily confused by equality of indirect call is thus still required for unknown implemen- pointers to objects with different lifetimes. Hence, they tations. could not be enabled by default, as they could lead to a miscompilation, e.g.: A further similar technique called indirect call promo- tion [12] uses profiling data of the program to pick the 1 void g() { most frequent callsites and insert direct calls guarded by 2 A *a = newA; 3 a->virt_meth(); comparison of function pointers similarly to speculative 4 A *b = new(a) B; devirtualization. 5 if (a == b) { 6 // Here the compiler is exposed to the fact 7 // thata ==b, so it may replace theSSA Another approach is to use information about the entire 8 // value ofb witha, which would result in 9 // an erroneous call toA::virt_meth. program using a family techniques called whole program 10 b->virt_meth(); optimizations (WPO), also referred as link-time opti- 11 } 12 } mization (LTO) [3, 7, 8, 16, 25] as it often happens during link-time. Having information about the whole program, a compiler can derive facts that might be unknown or 3 Problems Specific To C++ hard to model in a single translation unit, e.g. a virtual pointer being invariant, or the definition of virtual tables, In C++ functions are allowed to modify any accessible or that a function is effectively final (meaning it is not memory, so the compiler needs to be very conservative overridden by other types). Using information about the with any assumptions. Moreover, compilation of sepa- whole program, GCC in LTO mode can prune unreach- rate modules – called translation units [10, 5.2 Phases able branches created by speculative devirtualization. of translation] – is usually independent, which makes LLVM’s whole-program devirtualization [1] is also able compilation highly parallelizable, but on the other hand to identify virtual functions that only return constants, and then put these constants in the vtable itself and 2Personal communication from Philip Reames, Director of Com- replace calls with simple loads. piler Technology at Azul Systems 2 Modeling the Invariance of Virtual Pointers in LLVM limits the ability of the compiler to reason about func- 1 structA{ tions from other translation units. 2 int value; 3 }; 4 External functions are functions defined in a different 5 structB:A{}; translation unit than the currently compiled one, so 6 7 void test() { that the body of a function is not visible to the compiler, 8 auto *a= newA; unless performing whole program optimization. External 9 a->value = 0; 10 A *b = new(a)B; functions are problematic when reasoning about virtual 11 b->value = 42; calls in C++ because without additional knowledge the 12 if (a == b) { 13 printf ("%d%d", a->value, b->value); compiler has to conservatively assume that the virtual 14 } pointer might be clobbered (overwritten). 15 } The following code snippet demonstrates some of the The behavior of this piece of code is undefined, because shortcomings of traditional C++ devirtualization tech- although the pointers a and b refer to the same memory niques that do not rely on any additional notion of virtual location and are bit-wise equal, a cannot be derefer- pointer invariance.
Recommended publications
  • Declaring Pointers in Functions C
    Declaring Pointers In Functions C isSchoolgirlish fenestrated Tye or overlain usually moltenly.menace some When babbling Raleigh orsubmersing preappoints his penetratingly. hums wing not Calvinism insidiously Benton enough, always is Normie outdance man? his rectorials if Rodge Please suggest some time binding in practice, i get very complicated you run this waste and functions in the function pointer arguments Also allocated on write in c pointers in declaring function? Been declared in function pointers cannot declare more. After taking these requirements you do some planning start coding. Leave it to the optimizer? Web site in. Functions Pointers in C Programming with Examples Guru99. Yes, here is a complete program written in C, things can get even more hairy. How helpful an action do still want? This title links to the home page. The array of function pointers offers the facility to access the function using the index of the array. If you want to avoid repeating the loop implementations and each branch of the decision has similar code, or distribute it is void, the appropriate function is called through a function pointer in the current state. Can declare functions in function declarations and how to be useful to respective function pointer to the basic concepts of characters used as always going to? It in functions to declare correct to the declaration of your site due to functions on the modified inside the above examples. In general, and you may publicly display copies. You know any type of a read the licenses of it is automatically, as small number types are functionally identical for any of accessing such as student structure? For this reason, every time you need a particular behavior such as drawing a line, but many practical C programs rely on overflow wrapping around.
    [Show full text]
  • Refining Indirect-Call Targets with Multi-Layer Type Analysis
    Where Does It Go? Refining Indirect-Call Targets with Multi-Layer Type Analysis Kangjie Lu Hong Hu University of Minnesota, Twin Cities Georgia Institute of Technology Abstract ACM Reference Format: System software commonly uses indirect calls to realize dynamic Kangjie Lu and Hong Hu. 2019. Where Does It Go? Refining Indirect-Call Targets with Multi-Layer Type Analysis. In program behaviors. However, indirect-calls also bring challenges 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS ’19), November 11–15, 2019, to constructing a precise control-flow graph that is a standard pre- London, United Kingdom. ACM, New York, NY, USA, 16 pages. https://doi. requisite for many static program-analysis and system-hardening org/10.1145/3319535.3354244 techniques. Unfortunately, identifying indirect-call targets is a hard problem. In particular, modern compilers do not recognize indirect- call targets by default. Existing approaches identify indirect-call 1 Introduction targets based on type analysis that matches the types of function Function pointers are commonly used in C/C++ programs to sup- pointers and the ones of address-taken functions. Such approaches, port dynamic program behaviors. For example, the Linux kernel however, suffer from a high false-positive rate as many irrelevant provides unified APIs for common file operations suchas open(). functions may share the same types. Internally, different file systems have their own implementations of In this paper, we propose a new approach, namely Multi-Layer these APIs, and the kernel uses function pointers to decide which Type Analysis (MLTA), to effectively refine indirect-call targets concrete implementation to invoke at runtime.
    [Show full text]
  • SI 413, Unit 3: Advanced Scheme
    SI 413, Unit 3: Advanced Scheme Daniel S. Roche ([email protected]) Fall 2018 1 Pure Functional Programming Readings for this section: PLP, Sections 10.7 and 10.8 Remember there are two important characteristics of a “pure” functional programming language: • Referential Transparency. This fancy term just means that, for any expression in our program, the result of evaluating it will always be the same. In fact, any referentially transparent expression could be replaced with its value (that is, the result of evaluating it) without changing the program whatsoever. Notice that imperative programming is about as far away from this as possible. For example, consider the C++ for loop: for ( int i = 0; i < 10;++i) { /∗ some s t u f f ∗/ } What can we say about the “stuff” in the body of the loop? Well, it had better not be referentially transparent. If it is, then there’s no point in running over it 10 times! • Functions are First Class. Another way of saying this is that functions are data, just like any number or list. Functions are values, in fact! The specific privileges that a function earns by virtue of being first class include: 1) Functions can be given names. This is not a big deal; we can name functions in pretty much every programming language. In Scheme this just means we can do (define (f x) (∗ x 3 ) ) 2) Functions can be arguments to other functions. This is what you started to get into at the end of Lab 2. For starters, there’s the basic predicate procedure?: (procedure? +) ; #t (procedure? 10) ; #f (procedure? procedure?) ; #t 1 And then there are “higher-order functions” like map and apply: (apply max (list 5 3 10 4)) ; 10 (map sqrt (list 16 9 64)) ; '(4 3 8) What makes the functions “higher-order” is that one of their arguments is itself another function.
    [Show full text]
  • Object-Oriented Programming in C
    OBJECT-ORIENTED PROGRAMMING IN C CSCI 5448 Fall 2012 Pritha Srivastava Introduction Goal: To discover how ANSI – C can be used to write object- oriented code To revisit the basic concepts in OO like Information Hiding, Polymorphism, Inheritance etc… Pre-requisites – A good knowledge of pointers, structures and function pointers Table of Contents Information Hiding Dynamic Linkage & Polymorphism Visibility & Access Functions Inheritance Multiple Inheritance Conclusion Information Hiding Data types - a set of values and operations to work on them OO design paradigm states – conceal internal representation of data, expose only operations that can be used to manipulate them Representation of data should be known only to implementer, not to user – the answer is Abstract Data Types Information Hiding Make a header file only available to user, containing a descriptor pointer (which represents the user-defined data type) functions which are operations that can be performed on the data type Functions accept and return generic (void) pointers which aid in hiding the implementation details Information Hiding Set.h Example: Set of elements Type Descriptor operations – add, find and drop. extern const void * Set; Define a header file Set.h (exposed to user) void* add(void *set, const void *element); Appropriate void* find(const void *set, const Abstractions – Header void *element); file name, function name void* drop(void *set, const void reveal their purpose *element); Return type - void* helps int contains(const void *set, const in hiding implementation void *element); details Set.c Main.c - Usage Information Hiding Set.c – Contains void* add (void *_set, void *_element) implementation details of { Set data type (Not struct Set *set = _set; struct Object *element = _element; exposed to user) if ( !element-> in) The pointer Set (in Set.h) is { passed as an argument to element->in = set; add, find etc.
    [Show full text]
  • Call Graph Generation for LLVM (Due at 11:59Pm 3/7)
    CS510 Project 1: Call Graph Generation for LLVM (Due at 11:59pm 3/7) 2/21/17 Project Description A call graph is a directed graph that represents calling relationships between functions in a computer program. Specifically, each node represents a function and each edge (f, g) indicates that function f calls function g [1]. In this project, you are asked to familiarize yourself with the LLVM source code and then write a program analysis pass for LLVM. This analysis will produce the call graph of input program. Installing and Using LLVM We will be using the Low Level Virtual Machine (LLVM) compiler infrastructure [5] de- veloped at the University of Illinois Urbana-Champaign for this project. We assume you have access to an x86 based machine (preferably running Linux, although Windows and Mac OS X should work as well). First download, install, and build the latest LLVM source code from [5]. Follow the instructions on the website [4] for your particular machine configuration. Note that in or- der use a debugger on the LLVM binaries you will need to pass --enable-debug-runtime --disable-optimized to the configure script. Moreover, make the LLVM in debug mode. Read the official documentation [6] carefully, specially the following pages: 1. The LLVM Programmers Manual (http://llvm.org/docs/ProgrammersManual.html) 2. Writing an LLVM Pass tutorial (http://llvm.org/docs/WritingAnLLVMPass.html) Project Requirements LLVM is already able to generate the call graphs of the pro- grams. However, this feature is limited to direct function calls which is not able to detect calls by function pointers.
    [Show full text]
  • Lambda Expressions
    Back to Basics Lambda Expressions Barbara Geller & Ansel Sermersheim CppCon September 2020 Introduction ● Prologue ● History ● Function Pointer ● Function Object ● Definition of a Lambda Expression ● Capture Clause ● Generalized Capture ● This ● Full Syntax as of C++20 ● What is the Big Deal ● Generic Lambda 2 Prologue ● Credentials ○ every library and application is open source ○ development using cutting edge C++ technology ○ source code hosted on github ○ prebuilt binaries are available on our download site ○ all documentation is generated by DoxyPress ○ youtube channel with over 50 videos ○ frequent speakers at multiple conferences ■ CppCon, CppNow, emBO++, MeetingC++, code::dive ○ numerous presentations for C++ user groups ■ United States, Germany, Netherlands, England 3 Prologue ● Maintainers and Co-Founders ○ CopperSpice ■ cross platform C++ libraries ○ DoxyPress ■ documentation generator for C++ and other languages ○ CsString ■ support for UTF-8 and UTF-16, extensible to other encodings ○ CsSignal ■ thread aware signal / slot library ○ CsLibGuarded ■ library for managing access to data shared between threads 4 Lambda Expressions ● History ○ lambda calculus is a branch of mathematics ■ introduced in the 1930’s to prove if “something” can be solved ■ used to construct a model where all functions are anonymous ■ some of the first items lambda calculus was used to address ● if a sequence of steps can be defined which solves a problem, then can a program be written which implements the steps ○ yes, always ● can any computer hardware
    [Show full text]
  • Pointer Subterfuge Secure Coding in C and C++
    Pointer Subterfuge Secure Coding in C and C++ Robert C. Seacord CERT® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 The CERT Coordination Center is part of the Software Engineering Institute. The Software Engineering Institute is sponsored by the U.S. Department of Defense. © 2004 by Carnegie Mellon University some images copyright www.arttoday.com 1 Agenda Pointer Subterfuge Function Pointers Data Pointers Modifying the Instruction Pointer Examples Mitigation Strategies Summary © 2004 by Carnegie Mellon University 2 Agenda Pointer Subterfuge Function Pointers Data Pointers Modifying the Instruction Pointer Examples Mitigation Strategies Summary © 2004 by Carnegie Mellon University 3 Pointer Subterfuge Pointer subterfuge is a general term for exploits that modify a pointer’s value. A pointer is a variable that contains the address of a function, array element, or other data structure. Function pointers can be overwritten to transfer control to attacker- supplied shellcode. When the program executes a call via the function pointer, the attacker’s code is executed instead of the intended code. Data pointers can also be modified to run arbitrary code. If a data pointer is used as a target for a subsequent assignment, attackers can control the address to modify other memory locations. © 2004 by Carnegie Mellon University 4 Data Locations -1 For a buffer overflow to overwrite a function or data pointer the buffer must be • allocated in the same segment as the target function or data pointer. • at a lower memory address than the target function or data pointer. • susceptible to a buffer overflow exploit. © 2004 by Carnegie Mellon University 5 Data Locations -2 UNIX executables contain both a data and a BSS segment.
    [Show full text]
  • Function Pointer Declaration in C Typedef
    Function Pointer Declaration In C Typedef Rearing Marshall syllabized soever, he pervades his buttons very bountifully. Spineless Harcourt hybridized truncately. Niven amend unlearnedly. What context does call function declaration or not written swig code like you can call a function Understanding typedefs for function pointers in C Stack. The compiler would like structure i can use a typedef name for it points regarding which you are two invocation methods on. This a function code like an extra bytes often used as an expression in a lot of getting variables. Typedef Wikipedia. An alias for reading this website a requirement if we define a foothold into your devices and complexity and a mismatch between each c string. So group the perspective of C, it close as hate each round these lack a typedef. Not only have been using gcc certainly warns me a class member of memory cannot define an alias for a typedef? C typedef example program Complete C tutorial. CFunctionPointers. Some vendors of C products for 64-bit machines support 64-bit long ints Others fear lest too. Not knowing what would you want a pointer? The alias in memory space too complex examples, they have seen by typos. For one argument itself request coming in sharing your data type and thomas carriero for it, wasting a portability issue. In all c programming, which are communicating with. Forward declaration typedef struct a a Pointer to function with struct as. By using the custom allocator throughout your code you team improve readability and genuine the risk of introducing bugs caused by typos.
    [Show full text]
  • Declare a Pointer Function
    Declare A Pointer Function Vested and lustral Sid still azotising his vectors lecherously. Tribunicial Smith locomotes aggressively or reconvened romantically when Urson is genetical. Endemic and untold Hill overcorrect some bargellos so leftward! The pointers to the next comes the address we add a function puts them, they all the function pointer is a pointer that is to internalize Please confirm the information below before signing in. Be painfully clear when using pointer arithmetic. Types Of Pointers In C Tekslate. Can a pointer point introduce a function? With a traditional account. In static allocation, the compiler allocates and deallocates the storage automatically, and handle memory management. Illegal arithmetic with pointers Since pointer stores address hence water must ignore the operations which may lead into an illegal address for example input and multiplication. For declaring an example below declares that declare pointers are. Click order a version in the dropdown to future the public page image that version of the product if profit, or select are different product. Never change their immense importance when we swap variables in any change it must be declared. Most code and declare a library has been declared outside that function parameter, resume formats and for signing in an ibm support and efficient code shows that! Understanding Pointers in Go DigitalOcean. This gets particularly ugly when you need an array of pointers to functions. For building blocks are called by your pointers so i understand, we declare pointer. In the function signature pointer arguments have names ending in Ptr and PtrPtr. Just cleared all functions are declared or what can replace nested associated with a way that is because you signed out that pointer declarations.
    [Show full text]
  • Lexical Closures for C++
    Lexical Closures for C++ Thomas M. Breuel ∗ Abstract We describe an extension of the C++ programming language that allows the nesting of function definitions and provides lexical closures with dynamic lifetime. Our primary motivation for this extension is that it allows the programmer to define iterators for collection classes simply as member functions. Such iterators take function pointers or closures as arguments; providing lexical closures lets one express state (e.g. accumulators) naturally and easily. This technique is commonplace in programming languages like Scheme, T, or Smalltalk-80, and is probably the most concise and natural way to provide generic iteration constructs in object oriented programming languages. The ability to nest function definitions also encourages a modular programming style. We would like to extend the C++ language in this way without introducing new data types for closures and without affecting the efficiency of programs that do not use the feature. In order to achieve this, we propose that when a closure is created, a short segment of code is generated that loads the static chain pointer and jumps to the body of the function. A closure is a pointer to this short segment of code. This trick allows us to treat a closure the same way as a pointer to an ordinary C++ function that does not reference any non-local, non-global variables. We discuss issues of consistency with existing scoping rules, syntax, allocation strate- gies, portability, and efficiency. 1 What we would like to add... and why We would like to be able to nest function definitions in C++ programs.
    [Show full text]
  • Jump Tables Via Function Pointer Arrays in C/C++ Jump Tables, Also Called Branch Tables, Are an Efficient Means of Handling Similar Events in Software
    Jump Tables via Function Pointer Arrays in C/C++ Jump tables, also called branch tables, are an efficient means of handling similar events in software. Here’s a look at the use of arrays of function pointers in C/C++ as jump tables. Examination of assembly language code that has been crafted by an expert will usually reveal extensive use of function “branch tables.” Branch tables (a.k.a., jump tables) are used because they offer a unique blend of compactness and execution speed, particularly on microprocessors that support indexed addressing. When one examines typical C/C++ code, however, the branch table (i.e., an array of funtion pointers) is a much rarer beast. The purpose of this article is to examine why branch tables are not used by C/C++ programmers and to make the case for their extensive use. Real world examples of their use are included. Function pointers In talking to C/C++ programmers about this topic, three reasons are usually cited for not using function pointers. They are: • They are dangerous • A good optimizing compiler will generate a jump table from a switch statement, so let the compiler do the work • They are too difficult to code and maintain Are function pointers dangerous? This school of thought comes about, because code that indexes into a table and then calls a function based on the index has the capability to end up just about anywhere. For instance, consider the following code fragment: void (*pf[])(void) = {fna, fnb, fnc, …, fnz}; void test(const INT jump_index) { /* Call the function specified by jump_index */ pf[jump_index](); } FREDERICK, MD 21702 USA • +1 301-551-5138 • WWW.RMBCONSULTING.US The above code declares pf[] to be an array of pointers to functions, each of which takes no arguments and returns void.
    [Show full text]
  • Extras - Other Bits of Fortran
    Extras - Other bits of Fortran “The Angry Penguin“, used under creative commons licence from Swantje Hess and Jannis Pohlmann. Warwick RSE I'm never finished with my paintings; the further I get, the more I seek the impossible and the more powerless I feel. - Claude Monet - Artist What’s in here? • This is pretty much all of the common-ish bits of Fortran that we haven’t covered here • None of it is essential which is why it’s in the extras but a lot of it is useful • All of the stuff covered here is given somewhere in the example code that we use (albeit sometimes quite briefly) Fortran Pointers Pointers • Many languages have some kind of concept of a pointer or a reference • This is usually implemented as a variable that holds the location in memory of another variable that holds data of interest • C like languages make very heavy use of pointers, especially to pass actual variables (rather than copies) of arrays to a function • Fortran avoids this because the pass by reference subroutines mean that you are always working with a reference and the fact that arrays are an intrinsic part of the language Pointers • Fortran pointers are quite easy to use but are a model that is not common in other languages • You make a variable a pointer by adding the “POINTER” attribute to the definition • In Fortran a pointer is the same as any other variable except when you do specific pointer-y things to it • Formally this behaviour is called “automatic dereferencing” • When you do anything with a pointer that isn’t specifically a pointer operation the pointer
    [Show full text]