[llvm-bugs] [Bug 27315] New: new overflow check elimination code is too good

via llvm-bugs llvm-bugs at lists.llvm.org
Mon Apr 11 01:37:19 PDT 2016


https://llvm.org/bugs/show_bug.cgi?id=27315

            Bug ID: 27315
           Summary: new overflow check elimination code is too good
           Product: new-bugs
           Version: trunk
          Hardware: PC
                OS: All
            Status: NEW
          Severity: normal
          Priority: P
         Component: new bugs
          Assignee: unassignedbugs at nondot.org
          Reporter: regehr at cs.utah.edu
                CC: llvm-bugs at lists.llvm.org
    Classification: Unclassified

Sorry I didn't notice this during patch review, but the overflow elimination
logic that Sanjoy committed recently is too strong.

This program executes a signed overflow:

int foo(int p1, int p2) { return p1 + p2; }
int main(void) {
  for (int a = 0; a != 46; a = foo(a, 3))
    ;
}

But compiled like this, the overflow check goes away:

clang -O -fsanitize=undefined -fsanitize-trap=undefined

I'm using r265913

-- 
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20160411/cdf12f26/attachment.html>


More information about the llvm-bugs mailing list