[llvm-bugs] [Bug 27067] New: [Polly] Exploit undefined behavior of out-of-bound accesses in C/C++
via llvm-bugs
llvm-bugs at lists.llvm.org
Fri Mar 25 06:58:42 PDT 2016
https://llvm.org/bugs/show_bug.cgi?id=27067
Bug ID: 27067
Summary: [Polly] Exploit undefined behavior of out-of-bound
accesses in C/C++
Product: Polly
Version: unspecified
Hardware: PC
OS: Linux
Status: NEW
Severity: normal
Priority: P
Component: Optimizer
Assignee: polly-dev at googlegroups.com
Reporter: tobias at grosser.es
CC: llvm-bugs at lists.llvm.org
Classification: Unclassified
Created attachment 16091
--> https://llvm.org/bugs/attachment.cgi?id=16091&action=edit
Example with signed check
In case an __assume statement is within a Scop, we do not yet exploit the
properties it describes.
A use case for this would to pass out-of-bound information for C arrays to
LLVM-IR. In C, accesses that leave the bounds of a defined array are undefined
behavior. Consequently, we can use this information to simplify our context /
run-time checks.
It should be easy to teach our assumption tracking to exploit such expressions,
assuming the conditions we look at are signed (example attached).
--
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20160325/e7531c14/attachment.html>
More information about the llvm-bugs
mailing list