summaryrefslogtreecommitdiff
path: root/templates/hooks--pre-applypatch.sample
diff options
context:
space:
mode:
authorLibravatar Jeff King <peff@peff.net>2020-01-29 00:46:47 -0500
committerLibravatar Junio C Hamano <gitster@pobox.com>2020-01-28 23:12:48 -0800
commitd20bc01a51f7899deb7a04bdd7c2495789185297 (patch)
tree6d955d79dba41b1cdd3c4326509d614b67ca507a /templates/hooks--pre-applypatch.sample
parentmerge-recursive: use subtraction to flip stage (diff)
downloadtgif-d20bc01a51f7899deb7a04bdd7c2495789185297.tar.xz
avoid computing zero offsets from NULL pointer
The Undefined Behavior Sanitizer in clang-11 seems to have learned a new trick: it complains about computing offsets from a NULL pointer, even if that offset is 0. This causes numerous test failures. For example, from t1090: unpack-trees.c:1355:41: runtime error: applying zero offset to null pointer ... not ok 6 - in partial clone, sparse checkout only fetches needed blobs The code in question looks like this: struct cache_entry **cache_end = cache + nr; ... while (cache != cache_end) and we sometimes pass in a NULL and 0 for "cache" and "nr". This is conceptually fine, as "cache_end" would be equal to "cache" in this case, and we wouldn't enter the loop at all. But computing even a zero offset violates the C standard. And given the fact that UBSan is noticing this behavior, this might be a potential problem spot if the compiler starts making unexpected assumptions based on undefined behavior. So let's just avoid it, which is pretty easy. In some cases we can just switch to iterating with a numeric index (as we do in sequencer.c here). In other cases (like the cache_end one) the use of an end pointer is more natural; we can keep that by just explicitly checking for the NULL/0 case when assigning the end pointer. Note that there are two ways you can write this latter case, checking for the pointer: cache_end = cache ? cache + nr : cache; or the size: cache_end = nr ? cache + nr : cache; For the case of a NULL/0 ptr/len combo, they are equivalent. But writing it the second way (as this patch does) has the property that if somebody were to incorrectly pass a NULL pointer with a non-zero length, we'd continue to notice and segfault, rather than silently pretending the length was zero. Signed-off-by: Jeff King <peff@peff.net> Signed-off-by: Junio C Hamano <gitster@pobox.com>
Diffstat (limited to 'templates/hooks--pre-applypatch.sample')
0 files changed, 0 insertions, 0 deletions