https://llvm.org/bugs/show_bug.cgi?id=27067
Bug ID: 27067
Summary: [Polly] Exploit undefined behavior of out-of-bound
accesses in C/C++
Product: Polly
Version: unspecified
Hardware: PC
OS: Linux
Status: NEW
Severity: normal
Priority: P
Component: Optimizer
Assignee: [email protected]
Reporter: [email protected]
CC: [email protected]
Classification: Unclassified
Created attachment 16091
--> https://llvm.org/bugs/attachment.cgi?id=16091&action=edit
Example with signed check
In case an __assume statement is within a Scop, we do not yet exploit the
properties it describes.
A use case for this would to pass out-of-bound information for C arrays to
LLVM-IR. In C, accesses that leave the bounds of a defined array are undefined
behavior. Consequently, we can use this information to simplify our context /
run-time checks.
It should be easy to teach our assumption tracking to exploit such expressions,
assuming the conditions we look at are signed (example attached).
--
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
llvm-bugs mailing list
[email protected]
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs