aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorZiqing Luo <ziqing@udel.edu>2024-11-18 15:59:48 -0800
committerGitHub <noreply@github.com>2024-11-18 15:59:48 -0800
commit78606af606deca9dd4de2ac1aec17a966c114bc2 (patch)
tree777a6b189df209b64231c99fae4942c92ce98ecb
parent6e2b77d4696d4a672635c0ba1ead4824e2158a7d (diff)
downloadllvm-78606af606deca9dd4de2ac1aec17a966c114bc2.zip
llvm-78606af606deca9dd4de2ac1aec17a966c114bc2.tar.gz
llvm-78606af606deca9dd4de2ac1aec17a966c114bc2.tar.bz2
[-Wunsafe-buffer-usage] Fix bug in unsafe casts to incomplete types (#116433)
Fixed the crash coming from attempting to get size of incomplete types. Casting `span.data()` to a pointer-to-incomplete-type should be immediately considered unsafe. Solving issue #116286. Co-authored-by: Ziqing Luo <ziqing_luo@apple.com>
-rw-r--r--clang/lib/Sema/AnalysisBasedWarnings.cpp23
-rw-r--r--clang/test/SemaCXX/warn-unsafe-buffer-usage-warning-data-invocation.cpp17
2 files changed, 33 insertions, 7 deletions
diff --git a/clang/lib/Sema/AnalysisBasedWarnings.cpp b/clang/lib/Sema/AnalysisBasedWarnings.cpp
index f11fd3a..075c0df 100644
--- a/clang/lib/Sema/AnalysisBasedWarnings.cpp
+++ b/clang/lib/Sema/AnalysisBasedWarnings.cpp
@@ -2262,19 +2262,28 @@ public:
MsgParam = 5;
} else if (const auto *ECE = dyn_cast<ExplicitCastExpr>(Operation)) {
QualType destType = ECE->getType();
+ bool destTypeComplete = true;
+
if (!isa<PointerType>(destType))
return;
+ destType = destType.getTypePtr()->getPointeeType();
+ if (const auto *D = destType->getAsTagDecl())
+ destTypeComplete = D->isCompleteDefinition();
- const uint64_t dSize =
- Ctx.getTypeSize(destType.getTypePtr()->getPointeeType());
+ // If destination type is incomplete, it is unsafe to cast to anyway, no
+ // need to check its type:
+ if (destTypeComplete) {
+ const uint64_t dSize = Ctx.getTypeSize(destType);
+ QualType srcType = ECE->getSubExpr()->getType();
- QualType srcType = ECE->getSubExpr()->getType();
- const uint64_t sSize =
- Ctx.getTypeSize(srcType.getTypePtr()->getPointeeType());
+ assert(srcType->isPointerType());
- if (sSize >= dSize)
- return;
+ const uint64_t sSize =
+ Ctx.getTypeSize(srcType.getTypePtr()->getPointeeType());
+ if (sSize >= dSize)
+ return;
+ }
if (const auto *CE = dyn_cast<CXXMemberCallExpr>(
ECE->getSubExpr()->IgnoreParens())) {
D = CE->getMethodDecl();
diff --git a/clang/test/SemaCXX/warn-unsafe-buffer-usage-warning-data-invocation.cpp b/clang/test/SemaCXX/warn-unsafe-buffer-usage-warning-data-invocation.cpp
index 0228e42..a6a334d 100644
--- a/clang/test/SemaCXX/warn-unsafe-buffer-usage-warning-data-invocation.cpp
+++ b/clang/test/SemaCXX/warn-unsafe-buffer-usage-warning-data-invocation.cpp
@@ -173,4 +173,21 @@ A false_negatives(std::span<int> span_pt, span<A> span_A) {
return *a2; // TODO: Can cause OOB if span_pt is empty
}
+
+void test_incomplete_type(std::span<char> S) {
+ (struct IncompleteStruct *)S.data(); // expected-warning{{unsafe invocation of 'data'}}
+ (class IncompleteClass *)S.data(); // expected-warning{{unsafe invocation of 'data'}}
+ (union IncompleteUnion *)S.data(); // expected-warning{{unsafe invocation of 'data'}}
+}
+
+void test_complete_type(std::span<long> S) {
+ (struct CompleteStruct *)S.data(); // no warn as the struct size is smaller than long
+ (class CompleteClass *)S.data(); // no warn as the class size is smaller than long
+ (union CompleteUnion *)S.data(); // no warn as the union size is smaller than long
+
+ struct CompleteStruct {};
+ class CompleteClass {};
+ union CompleteUnion {};
+}
+
#endif