Skip to content

Commit

Permalink
src: remove workaround for container-overflow
Browse files Browse the repository at this point in the history
  • Loading branch information
lemire committed Jan 31, 2025
1 parent 261624b commit b7391a4
Showing 1 changed file with 1 addition and 13 deletions.
14 changes: 1 addition & 13 deletions src/node_modules.cc
Original file line number Diff line number Diff line change
Expand Up @@ -106,23 +106,11 @@ const BindingData::PackageConfig* BindingData::GetPackageJSON(
if (ReadFileSync(&package_config.raw_json, path.data()) < 0) {
return nullptr;
}
// In some systems, std::string is annotated to generate an
// AddressSanitizer: container-overflow error when reading beyond the end of
// the string even when we are still within the capacity of the string.
// https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow
// https://github.com/nodejs/node/issues/55584
// The next lines are a workaround to avoid this false positive.
size_t json_length = package_config.raw_json.size();
package_config.raw_json.append(simdjson::SIMDJSON_PADDING, ' ');
simdjson::padded_string_view json_view(package_config.raw_json.data(),
json_length,
package_config.raw_json.size());
// End of workaround

simdjson::ondemand::document document;
simdjson::ondemand::object main_object;
simdjson::error_code error =
binding_data->json_parser.iterate(json_view).get(document);
binding_data->json_parser.iterate(simdjson::pad(package_config.raw_json)).get(document);

const auto throw_invalid_package_config = [error_context, path, realm]() {
if (error_context == nullptr) {
Expand Down

0 comments on commit b7391a4

Please sign in to comment.