Status: New
Owner: ----
Labels: Type-Defect Priority-Medium

New issue 352 by [email protected]: False positive related to atomic operations
https://code.google.com/p/address-sanitizer/issues/detail?id=352

Not sure how important it is, but for what it's worth:

Racy use-after-free in the following code is never detected, as the second access to *p is not instrumented.

void foo(long *p, long *q)
{
        *p = 1;
__atomic_store_n(q, 2, __ATOMIC_RELEASE); // signals another thread to free(p)
        *p = *p + 1;
}

From the point of view of the analysis that we do in asan, an atomic store is equivalent to a function call.


--
You received this message because this project is configured to send all issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings

--
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to