Status: New
Owner: ----
Labels: Type-Defect Priority-Medium
New issue 352 by [email protected]: False positive related to atomic
operations
https://code.google.com/p/address-sanitizer/issues/detail?id=352
Not sure how important it is, but for what it's worth:
Racy use-after-free in the following code is never detected, as the second
access to *p is not instrumented.
void foo(long *p, long *q)
{
*p = 1;
__atomic_store_n(q, 2, __ATOMIC_RELEASE); // signals another thread to
free(p)
*p = *p + 1;
}
From the point of view of the analysis that we do in asan, an atomic store
is equivalent to a function call.
--
You received this message because this project is configured to send all
issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings
--
You received this message because you are subscribed to the Google Groups
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.