-
Notifications
You must be signed in to change notification settings - Fork 12.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[analyzer] Fix StackAddrEscapeChecker crash on temporary object fields #66493
Conversation
@llvm/pr-subscribers-clang-static-analyzer-1 @llvm/pr-subscribers-clang ChangesBasically, the issue was that we should have unwrap the base region before we special handle temp object regions.Fixes #66221 I also decided to add some extra range information to the diagnostics to make it consistent with the other reporting path.Full diff: https://github.com/llvm/llvm-project/pull/66493.diff 2 Files Affected:
diff --git a/clang/lib/StaticAnalyzer/Checkers/StackAddrEscapeChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/StackAddrEscapeChecker.cpp index 19ff8c8e2a171ae..23a774931b21dec 100644 --- a/clang/lib/StaticAnalyzer/Checkers/StackAddrEscapeChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/StackAddrEscapeChecker.cpp @@ -369,7 +369,7 @@ void StackAddrEscapeChecker::checkEndFunction(const ReturnStmt *RS, "Stack address stored into global variable"); for (const auto &P : Cb.V) { - const MemRegion *Referrer = P.first; + const MemRegion *Referrer = P.first->getBaseRegion(); const MemRegion *Referred = P.second; // Generate a report for this bug. @@ -384,6 +384,8 @@ void StackAddrEscapeChecker::checkEndFunction(const ReturnStmt *RS, << CommonSuffix; auto Report = std::make_unique<PathSensitiveBugReport>(*BT_stackleak, Out.str(), N); + if (Range.isValid()) + Report->addRange(Range); Ctx.emitReport(std::move(Report)); return; } @@ -398,7 +400,7 @@ void StackAddrEscapeChecker::checkEndFunction(const ReturnStmt *RS, }(Referrer->getMemorySpace()); // This cast supposed to succeed. - const VarRegion *ReferrerVar = cast<VarRegion>(Referrer->getBaseRegion()); + const auto *ReferrerVar = cast<VarRegion>(Referrer); const std::string ReferrerVarName = ReferrerVar->getDecl()->getDeclName().getAsString(); diff --git a/clang/test/Analysis/stackaddrleak.cpp b/clang/test/Analysis/stackaddrleak.cpp new file mode 100644 index 000000000000000..5828f2ac6e78c8d --- /dev/null +++ b/clang/test/Analysis/stackaddrleak.cpp @@ -0,0 +1,24 @@ +// RUN: %clang_analyze_cc1 -analyzer-checker=core -verify %s + +void *operator new(unsigned long, void *p) { return p; } + +struct myfunction { + union storage_t { + char buffer[100]; + unsigned long long max_align; + } storage; + + template <typename Func> myfunction(Func fn) { + new (&storage.buffer) Func(fn); + } + void operator()(); +}; + +myfunction create_func() { + int n; + auto c = [&n] {}; + return c; // expected-warning {{Address of stack memory associated with local variable 'n' is still referred to by a temporary object on the stack upon returning to the caller. This will be a dangling reference}} +} +void gh_66221() { + create_func()(); +} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice bugfix; I have only one tangential remark.
Let me know if you are still okay with the latest change. @donatnagye @Xazax-hun |
LGTM. |
Basically, the issue was that we should have unwrap the base region before we special handle temp object regions. Fixes llvm#66221
d569f78
to
895826d
Compare
Fixed tests for Windows, to use |
Basically, the issue was that we should have unwrap the base region before we special handle temp object regions.
Fixes #66221
I also decided to add some extra range information to the diagnostics to make it consistent with the other reporting path.