diff options
author | Xi Wang <xi.wang@gmail.com> | 2013-03-19 14:35:16 -0400 |
---|---|---|
committer | Russ Cox <rsc@swtch.com> | 2013-03-19 14:35:16 -0400 |
commit | 8a2a5b8f2568a665f00741994c1247f0f7d3dffe (patch) | |
tree | 054259e5f4ee1c94e0afde8fbf0fb518940e5264 /acid/leak | |
parent | 01e3847b7e6ff87f72a34a42cd98425e569250f6 (diff) | |
download | plan9port-8a2a5b8f2568a665f00741994c1247f0f7d3dffe.tar.gz plan9port-8a2a5b8f2568a665f00741994c1247f0f7d3dffe.tar.bz2 plan9port-8a2a5b8f2568a665f00741994c1247f0f7d3dffe.zip |
libsec: avoid undefined C
gcc compiles `p + length < p' into 'length < 0' since pointer overflow is undefined behavior in C. This breaks the check against a large `length'.
Use `length > pend - p' instead.
There's no need to check `length < 0' since `length' is from length_decode() and should be non-negative.
===
Try the simplified code.
void bar(void);
void foo(unsigned char *p, int length)
{
if (p + length < p)
bar();
}
$ gcc -S -o - t.c -O2
...
foo:
.LFB0:
.cfi_startproc
testl %esi, %esi
js .L4
rep
ret
.L4:
jmp bar
.cfi_endproc
Clearly `p' is not used at all.
R=rsc
CC=plan9port.codebot
https://codereview.appspot.com/7231069
Diffstat (limited to 'acid/leak')
0 files changed, 0 insertions, 0 deletions