mirror of
https://github.com/llvm/llvm-project.git
synced 2025-04-16 15:06:36 +00:00

Original pull request [here](https://github.com/llvm/llvm-project/pull/108385) Fixes issue https://github.com/llvm/llvm-project/issues/105960 If a member in a struct is also a struct, accessing a member partway through this inner struct currently causes a false positive. This is because when checking aliasing, the access offset is seen as greater than the starting offset of the inner struct, so the loop continues one iteration, and believes we are accessing the member after the inner struct. The next member's offset is greater than the offset we are looking for, so when we subtract the next member's offset from what we are looking for, the offset underflows. To fix this, we check if the member we think we are accessing has a greater offset than the offset we are looking for. If so, we take a step back. We cannot do this in the loop, since the loop does not check the final member. This means the penultimate member would still cause false positives.
50 lines
952 B
C++
50 lines
952 B
C++
// RUN: %clangxx_tysan -O0 %s -o %t && %run %t >%t.out 2>&1
|
|
// RUN: FileCheck %s --implicit-check-not ERROR < %t.out
|
|
|
|
// Modified reproducer from https://github.com/llvm/llvm-project/issues/105960
|
|
|
|
#include <stdio.h>
|
|
|
|
struct inner1 {
|
|
char buffer;
|
|
int i;
|
|
};
|
|
|
|
struct inner2 {
|
|
char buffer;
|
|
int i;
|
|
float endBuffer;
|
|
};
|
|
|
|
void init_inner1(inner1 *iPtr) { iPtr->i = 200; }
|
|
void init_inner2(inner2 *iPtr) {
|
|
iPtr->i = 400;
|
|
iPtr->endBuffer = 413.0f;
|
|
}
|
|
|
|
struct outer {
|
|
inner1 foo;
|
|
inner2 bar;
|
|
char buffer;
|
|
};
|
|
|
|
int main(void) {
|
|
outer *l = new outer();
|
|
|
|
init_inner1(&l->foo);
|
|
init_inner2(&l->bar);
|
|
|
|
int access = l->foo.i;
|
|
printf("Accessed value 1 is %d\n", access);
|
|
access = l->bar.i;
|
|
printf("Accessed value 2 is %d\n", access);
|
|
float fAccess = l->bar.endBuffer;
|
|
printf("Accessed value 3 is %f\n", fAccess);
|
|
|
|
return 0;
|
|
}
|
|
|
|
// CHECK: Accessed value 1 is 200
|
|
// CHECK: Accessed value 2 is 400
|
|
// CHECK: Accessed value 3 is 413.0
|