Skip to content

Commit

Permalink
Disallow dereferencing of void* in C++.
Browse files Browse the repository at this point in the history
as Discussed:
https://discourse.llvm.org/t/rfc-can-we-stop-the-extension-to-allow-dereferencing-void-in-c/65708

There is no good reason to allow this when the other compilers all
reject this, and it messes with SFINAE/constraint checking.

Differential Revision: https://reviews.llvm.org/D135287
  • Loading branch information
Erich Keane committed Oct 10, 2022
1 parent 7915027 commit 6685e56
Show file tree
Hide file tree
Showing 7 changed files with 45 additions and 10 deletions.
12 changes: 12 additions & 0 deletions clang/docs/ReleaseNotes.rst
Original file line number Diff line number Diff line change
Expand Up @@ -117,6 +117,18 @@ code bases.

These errors also match MSVC's behavior.

- Clang now diagnoses indirection of ``void *`` in C++ mode as a warning which
defaults to an error. This is compatible with ISO C++, GCC, ICC, and MSVC. This
is also now a SFINAE error so constraint checking and SFINAE checking can be
compatible with other compilers. It is expected that this will be upgraded to
an error-only diagnostic in the next Clang release.

.. code-block:: c++

void func(void *p) {
*p; // Now diagnosed as a warning-as-error.
}
What's New in Clang |release|?
==============================
Some of the major new features and improvements to Clang are listed
Expand Down
1 change: 1 addition & 0 deletions clang/include/clang/Basic/DiagnosticGroups.td
Original file line number Diff line number Diff line change
Expand Up @@ -961,6 +961,7 @@ def PointerToEnumCast : DiagGroup<"pointer-to-enum-cast",
[VoidPointerToEnumCast]>;
def PointerToIntCast : DiagGroup<"pointer-to-int-cast",
[PointerToEnumCast, VoidPointerToIntCast]>;
def VoidPointerDeref : DiagGroup<"void-ptr-dereference">;

def FUseLdPath : DiagGroup<"fuse-ld-path">;

Expand Down
7 changes: 5 additions & 2 deletions clang/include/clang/Basic/DiagnosticSemaKinds.td
Original file line number Diff line number Diff line change
Expand Up @@ -6936,8 +6936,11 @@ def err_typecheck_unary_expr : Error<
def err_typecheck_indirection_requires_pointer : Error<
"indirection requires pointer operand (%0 invalid)">;
def ext_typecheck_indirection_through_void_pointer : ExtWarn<
"ISO %select{C|C++}0 does not allow indirection on operand of type %1">,
InGroup<DiagGroup<"void-ptr-dereference">>;
"ISO C does not allow indirection on operand of type %0">,
InGroup<VoidPointerDeref>;
def ext_typecheck_indirection_through_void_pointer_cpp
: ExtWarn<"ISO C++ does not allow indirection on operand of type %0">,
InGroup<VoidPointerDeref>, DefaultError, SFINAEFailure;
def warn_indirection_through_null : Warning<
"indirection of non-volatile null pointer will be deleted, not trap">,
InGroup<NullDereference>;
Expand Down
7 changes: 5 additions & 2 deletions clang/lib/Sema/SemaExpr.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -14536,9 +14536,12 @@ static QualType CheckIndirectionOperand(Sema &S, Expr *Op, ExprValueKind &VK,
// [...] the expression to which [the unary * operator] is applied shall
// be a pointer to an object type, or a pointer to a function type
LangOptions LO = S.getLangOpts();
if (LO.CPlusPlus || (!(LO.C99 && IsAfterAmp) && !S.isUnevaluatedContext()))
if (LO.CPlusPlus)
S.Diag(OpLoc, diag::ext_typecheck_indirection_through_void_pointer_cpp)
<< OpTy << Op->getSourceRange();
else if (!(LO.C99 && IsAfterAmp) && !S.isUnevaluatedContext())
S.Diag(OpLoc, diag::ext_typecheck_indirection_through_void_pointer)
<< LO.CPlusPlus << OpTy << Op->getSourceRange();
<< OpTy << Op->getSourceRange();
}

// Dereferences are usually l-values...
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ struct X0 {

template<typename T, typename U>
void X0<T, U>::f(T *t, const U &u) {
*t = u; // expected-warning{{indirection on operand of type 'void *'}} expected-error{{not assignable}}
*t = u; // expected-error{{indirection on operand of type 'void *'}} expected-error{{not assignable}}
}

void test_f(X0<float, int> xfi, X0<void, int> xvi, float *fp, void *vp, int i) {
Expand Down
16 changes: 16 additions & 0 deletions clang/test/SemaCXX/disallow_void_deref.cpp
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
// RUN: %clang_cc1 -fsyntax-only -verify=enabled,sfinae -std=c++20 %s
// RUN: %clang_cc1 -fsyntax-only -verify=sfinae -std=c++20 -Wno-void-ptr-dereference %s

void f(void* p) {
(void)*p; // enabled-error{{ISO C++ does not allow indirection on operand of type 'void *'}}
}

template<class T>
concept deref = requires (T& t) {
{ *t }; // #FAILED_REQ
};

static_assert(deref<void*>);
// sfinae-error@-1{{static assertion failed}}
// sfinae-note@-2{{because 'void *' does not satisfy 'deref'}}
// sfinae-note@#FAILED_REQ{{because '*t' would be invalid: ISO C++ does not allow indirection on operand of type 'void *'}}
10 changes: 5 additions & 5 deletions clang/test/SemaCXX/reinterpret-cast.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -214,11 +214,11 @@ void dereference_reinterpret_cast() {
(void)*reinterpret_cast<float*>(v_ptr);

// Casting to void pointer
(void)*reinterpret_cast<void*>(&a); // expected-warning {{ISO C++ does not allow}}
(void)*reinterpret_cast<void*>(&b); // expected-warning {{ISO C++ does not allow}}
(void)*reinterpret_cast<void*>(&l); // expected-warning {{ISO C++ does not allow}}
(void)*reinterpret_cast<void*>(&d); // expected-warning {{ISO C++ does not allow}}
(void)*reinterpret_cast<void*>(&f); // expected-warning {{ISO C++ does not allow}}
(void)*reinterpret_cast<void*>(&a); // expected-error {{ISO C++ does not allow}}
(void)*reinterpret_cast<void*>(&b); // expected-error {{ISO C++ does not allow}}
(void)*reinterpret_cast<void*>(&l); // expected-error {{ISO C++ does not allow}}
(void)*reinterpret_cast<void*>(&d); // expected-error {{ISO C++ does not allow}}
(void)*reinterpret_cast<void*>(&f); // expected-error {{ISO C++ does not allow}}
}

void reinterpret_cast_allowlist () {
Expand Down

0 comments on commit 6685e56

Please sign in to comment.