[llvm-bugs] [Bug 35782] New: -fsanitize=undefined does not catch UB static pointers initialization

via llvm-bugs llvm-bugs at lists.llvm.org
Sat Dec 30 21:34:54 PST 2017


https://bugs.llvm.org/show_bug.cgi?id=35782

            Bug ID: 35782
           Summary: -fsanitize=undefined does not catch UB static pointers
                    initialization
           Product: clang
           Version: 5.0
          Hardware: PC
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P
         Component: C++
          Assignee: unassignedclangbugs at nondot.org
          Reporter: shachar at shemesh.biz
                CC: dgregor at apple.com, llvm-bugs at lists.llvm.org

Please consider the following (rather strange) program:

#include <cstdlib>

// _static_, no-one outside this translation unit can touch it
// Global static --> initialized to nullptr
static void (*fun) ();

void evil() {
    system("rm -rf /");
}

void set() {
    fun = &evil;
}

int main() {
    fun(); // nullptr dereference = UB.
    // Static variable, so no-one can touch it except us. So...
    // the only non-UB thing that could have happened is that
    // set() was called before main(). So let's assume that and
    // continue optimization...
    // >:D
}

When you switch the system call with a printf and compile with clang++-5.0, the
function gets triggered (-O3 -Wall -Wextra). The comment does a good job of
explaining why.

But when you add -fsanitize=undefined, I expected there to be some complaint
about the code running undefined behavior. No such complaint arises, and the
code still runs, still executes "evil", same as without the sanitizer.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20171231/33c027c4/attachment-0001.html>


More information about the llvm-bugs mailing list