Fix for dereferencing type-punned pointer will break strict-aliasing

75,568

Solution 1

First off, let's examine why you get the aliasing violation warnings.

Aliasing rules simply say that you can only access an object through its own type, its signed / unsigned variant type, or through a character type (char, signed char, unsigned char).

C says violating aliasing rules invokes undefined behavior (so don't!).

In this line of your program:

unsigned int received_size = ntohl (*((unsigned int*)dcc->incoming_buf));

although the elements of the incoming_buf array are of type char, you are accessing them as unsigned int. Indeed the result of the dereference operator in the expression *((unsigned int*)dcc->incoming_buf) is of unsigned int type.

This is a violation of the aliasing rules, because you only have the right to access elements of incoming_buf array through (see rules summary above!) char, signed char or unsigned char.

Notice you have exactly the same aliasing issue in your second culprit:

*((unsigned int*)dcc->outgoing_buf) = htonl (dcc->file_confirm_offset);

You access the char elements of outgoing_buf through unsigned int, so it's an aliasing violation.

Proposed solution

To fix your issue, you could try to have the elements of your arrays directly defined in the type you want to access:

unsigned int incoming_buf[LIBIRC_DCC_BUFFER_SIZE / sizeof (unsigned int)];
unsigned int outgoing_buf[LIBIRC_DCC_BUFFER_SIZE / sizeof (unsigned int)];

(By the way the width of unsigned int is implementation defined, so you should consider using uint32_t if your program assumes unsigned int is 32-bit).

This way you could store unsigned int objects in your array without violating the aliasing rules by accessing the element through the type char, like this:

*((char *) outgoing_buf) =  expr_of_type_char;

or

char_lvalue = *((char *) incoming_buf);

EDIT:

I've entirely reworked my answer, in particular I explain why the program gets the aliasing warnings from the compiler.

Solution 2

To fix the problem, don't pun and alias! The only "correct" way to read a type T is to allocate a type T and populate its representation if needed:

uint32_t n;
memcpy(&n, dcc->incoming_buf, 4);

In short: If you want an integer, you need to make an integer. There's no way to cheat around that in a language-condoned way.

The only pointer conversion which you are allowed (for purposes of I/O, generally) is to treat the address of an existing variable of type T as a char*, or rather, as the pointer to the first element of an array of chars of size sizeof(T).

Solution 3

union
{
    const unsigned int * int_val_p;
    const char* buf;
} xyz;

xyz.buf = dcc->incoming_buf;
unsigned int received_size = ntohl(*(xyz.int_val_p));

Simplified explanation 1. c++ standard states that you should attempt to align data yourself, g++ goes an extra mile to generate warnings on the subject. 2. you should only attempt it if you completely understand the data alignment on your architecture/system and inside your code (for example the code above is a sure thing on Intel 32/64 ; alignment 1; Win/Linux/Bsd/Mac) 3. the only practical reason to use the code above is to avoid compiler warnings , WHEN and IF you know what you are doing

Solution 4

If I may, IMHO, for this case, the problem is the design of the ntohl and htonl and related function APIs. They should not have been written as numeric argument with numeric return. (and yes, I understand the macro optimization point) They should have been designed as the 'n' side being a pointer to a buffer. When this is done, the whole problem goes away and the routine is accurate whichever endian the host is. For example (with no attempt to optimize):

inline void safe_htonl(unsigned char *netside, unsigned long value) {
    netside[3] = value & 0xFF;
    netside[2] = (value >> 8) & 0xFF;
    netside[1] = (value >> 16) & 0xFF;
    netside[0] = (value >> 24) & 0xFF;
};

Solution 5

If you have reasons that do not allow you to change type of source object (like it was in my case), and you are absolutely confident that the code is correct and it does what intended to do with that char array, to avoid warnings you may do the following:

unsigned int* buf = (unsigned int*)dcc->incoming_buf;
unsigned int received_size = ntohl (*buf);
Share:
75,568
BlankFrank
Author by

BlankFrank

Updated on July 09, 2022

Comments

  • BlankFrank
    BlankFrank almost 2 years

    I'm trying to fix two warnings when compiling a specific program using GCC. The warnings are:

    warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]

    and the two culprits are:

    unsigned int received_size = ntohl (*((unsigned int*)dcc->incoming_buf));
    

    and

    *((unsigned int*)dcc->outgoing_buf) = htonl (dcc->file_confirm_offset);
    

    incoming_buf and outgoing_buf are defined as follows:

    char                    incoming_buf[LIBIRC_DCC_BUFFER_SIZE];
    
    char                    outgoing_buf[LIBIRC_DCC_BUFFER_SIZE];
    

    This seems subtly different than the other examples of that warning I've been examining. I would prefer to fix the problem rather than disable strict-aliasing checks.

    There have been many suggestions to use a union - what might be a suitable union for this case?

    • Mysticial
      Mysticial over 12 years
      Interesting... strict-aliasing shouldn't apply to char*. Or am I missing something?
    • ouah
      ouah over 12 years
      @Mysticial Yes, what you are missing is there is no aliasing violation when an object of type T1 is accessed with a lvalue of type T2 and T2 is char, but when T1 is char and T2 is not of a signed/unsigned variant of char, there is an aliasing violation.
    • Kerrek SB
      Kerrek SB over 12 years
      @Mysticial: You got it the wrong way round!
  • supercat
    supercat over 5 years
    If the Standard were to include a standard set of big-endian and little-endian "fetch" and "stuff" routines, such routines could usefully have behavior defined in terms of octets even on machines where CHAR_BIT isn't eight, thus enhancing the portability of networking code on such machines.
  • OmarL
    OmarL almost 4 years
    I'm not sure sizeof(uint32_t) is guaranteed to be 4, so you may need to adjust your memcpy
  • Andrew Henle
    Andrew Henle about 3 years
    Casting away warnings is bad. This code does nothing about violating strict aliasing and can also violate alignment restrictions.
  • yanychar
    yanychar about 2 years
    the warning can silenced by double casting through void *. see my answer
  • chqrlie
    chqrlie about 2 years
    @OmarL: correct. uint32_t is guaranteed to have exactly 32 value bits and no padding bits, but sizeof(uint32_t) can be 2 if unsigned char has 16 bits and even 1 if unsigned char has 32 bits. The example should be amended as memcpy(&n, dcc->incoming_buf, sizeof(n));