]> git.ipfire.org Git - thirdparty/postgresql.git/commitdiff
Fix various instances of undefined behavior
authorJohn Naylor <john.naylor@postgresql.org>
Wed, 4 Feb 2026 10:55:49 +0000 (17:55 +0700)
committerJohn Naylor <john.naylor@postgresql.org>
Wed, 4 Feb 2026 11:09:35 +0000 (18:09 +0700)
Mostly this involves checking for NULL pointer before doing operations
that add a non-zero offset.

The exception is an overflow warning in heap_fetch_toast_slice(). This
was caused by unneeded parentheses forcing an expression to be
evaluated to a negative integer, which then got cast to size_t.

Per clang 21 undefined behavior sanitizer.

Backpatch to all supported versions.

Co-authored-by: Alexander Lakhin <exclusion@gmail.com>
Reported-by: Alexander Lakhin <exclusion@gmail.com>
Discussion: https://postgr.es/m/777bd201-6e3a-4da0-a922-4ea9de46a3ee@gmail.com
Backpatch-through: 14

contrib/pg_trgm/trgm_gist.c
src/backend/access/heap/heaptoast.c
src/backend/utils/adt/multirangetypes.c
src/backend/utils/sort/sharedtuplestore.c

index 2f0d61985a5238756aff8bf5b77c20ee3672ce82..685275a0f9bbad091dd37187821bbe8d5f96c93c 100644 (file)
@@ -701,10 +701,13 @@ gtrgm_penalty(PG_FUNCTION_ARGS)
        if (ISARRKEY(newval))
        {
                char       *cache = (char *) fcinfo->flinfo->fn_extra;
-               TRGM       *cachedVal = (TRGM *) (cache + MAXALIGN(siglen));
+               TRGM       *cachedVal = NULL;
                Size            newvalsize = VARSIZE(newval);
                BITVECP         sign;
 
+               if (cache != NULL)
+                       cachedVal = (TRGM *) (cache + MAXALIGN(siglen));
+
                /*
                 * Cache the sign data across multiple calls with the same newval.
                 */
index e28fe47a449869efe8ffd02583c410eec72dd386..6ddf6c6cf9f745dfdddc7f2f64f5685dfb14c5dd 100644 (file)
@@ -768,7 +768,7 @@ heap_fetch_toast_slice(Relation toastrel, Oid valueid, int32 attrsize,
                        chcpyend = (sliceoffset + slicelength - 1) % TOAST_MAX_CHUNK_SIZE;
 
                memcpy(VARDATA(result) +
-                          (curchunk * TOAST_MAX_CHUNK_SIZE - sliceoffset) + chcpystrt,
+                          curchunk * TOAST_MAX_CHUNK_SIZE - sliceoffset + chcpystrt,
                           chunkdata + chcpystrt,
                           (chcpyend - chcpystrt) + 1);
 
index b1942387dc5c22db7fcacb7c151cb8ff08059895..9548989d7820fb4fa0d4b5545e387ced079a7717 100644 (file)
@@ -485,8 +485,9 @@ multirange_canonicalize(TypeCacheEntry *rangetyp, int32 input_range_count,
        int32           output_range_count = 0;
 
        /* Sort the ranges so we can find the ones that overlap/meet. */
-       qsort_arg(ranges, input_range_count, sizeof(RangeType *), range_compare,
-                         rangetyp);
+       if (ranges != NULL)
+               qsort_arg(ranges, input_range_count, sizeof(RangeType *),
+                                 range_compare, rangetyp);
 
        /* Now merge where possible: */
        for (i = 0; i < input_range_count; i++)
index 8f35a255263c14db1bf0c0774ce1dfbe35d15a81..04189f708fa47b92e3a6461180159298431c4eba 100644 (file)
@@ -323,7 +323,8 @@ sts_puttuple(SharedTuplestoreAccessor *accessor, void *meta_data,
 
        /* Do we have space? */
        size = accessor->sts->meta_data_size + tuple->t_len;
-       if (accessor->write_pointer + size > accessor->write_end)
+       if (accessor->write_pointer == NULL ||
+               accessor->write_pointer + size > accessor->write_end)
        {
                if (accessor->write_chunk == NULL)
                {