From: George Karpenkov Date: Mon, 26 Feb 2018 21:32:57 +0000 (+0000) Subject: Revert "[analyzer] Quickfix: do not overflow in calculating offset in RegionManager" X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=10613655160cf7a0a3cd8fea069086d938f7d1ab;p=clang Revert "[analyzer] Quickfix: do not overflow in calculating offset in RegionManager" This reverts commit df306c4c5ab4a6b8d3c47432346d1f9b90c328b4. Reverting until I can figured out the reasons for failures. git-svn-id: https://llvm.org/svn/llvm-project/cfe/trunk@326131 91177308-0d34-0410-b5e6-96231b3b80d8 --- diff --git a/lib/StaticAnalyzer/Core/MemRegion.cpp b/lib/StaticAnalyzer/Core/MemRegion.cpp index 2f77524f68..aa54544fa7 100644 --- a/lib/StaticAnalyzer/Core/MemRegion.cpp +++ b/lib/StaticAnalyzer/Core/MemRegion.cpp @@ -23,11 +23,6 @@ #include "clang/Basic/SourceManager.h" #include "clang/StaticAnalyzer/Core/PathSensitive/SValBuilder.h" #include "llvm/Support/raw_ostream.h" -#include "llvm/Support/Debug.h" - -#include - -#define DEBUG_TYPE "MemRegion" using namespace clang; using namespace ento; @@ -1154,36 +1149,6 @@ const SymbolicRegion *MemRegion::getSymbolicBase() const { return nullptr; } -/// Perform a given operation on two integers, return whether it overflows. -/// Optionally write the resulting output into \p Res. -static bool checkedOp( - int64_t LHS, - int64_t RHS, - std::function Op, - int64_t *Res = nullptr) { - llvm::APInt ALHS(/*BitSize=*/64, LHS, /*Signed=*/true); - llvm::APInt ARHS(/*BitSize=*/64, RHS, /*Signed=*/true); - bool Overflow; - llvm::APInt Out = Op(&ALHS, ARHS, Overflow); - if (!Overflow && Res) - *Res = Out.getSExtValue(); - return Overflow; -} - -static bool checkedAdd( - int64_t LHS, - int64_t RHS, - int64_t *Res=nullptr) { - return checkedOp(LHS, RHS, &llvm::APInt::sadd_ov, Res); -} - -static bool checkedMul( - int64_t LHS, - int64_t RHS, - int64_t *Res=nullptr) { - return checkedOp(LHS, RHS, &llvm::APInt::smul_ov, Res); -} - RegionRawOffset ElementRegion::getAsArrayOffset() const { CharUnits offset = CharUnits::Zero(); const ElementRegion *ER = this; @@ -1211,17 +1176,6 @@ RegionRawOffset ElementRegion::getAsArrayOffset() const { } CharUnits size = C.getTypeSizeInChars(elemType); - - int64_t Mult; - bool Overflow = checkedAdd(i, size.getQuantity(), &Mult); - Overflow |= checkedMul(Mult, offset.getQuantity()); - if (Overflow) { - DEBUG(llvm::dbgs() << "MemRegion::getAsArrayOffset: " - << "offset overflowing, returning unknown\n"); - - return nullptr; - } - offset += (i * size); } diff --git a/test/Analysis/region-store.cpp b/test/Analysis/region-store.cpp index ab179ceb1a..cb49f4837d 100644 --- a/test/Analysis/region-store.cpp +++ b/test/Analysis/region-store.cpp @@ -25,4 +25,4 @@ int radar13445834(Derived *Builder, Loc l) { Builder->setLoc(l); return Builder->accessBase(); -} +} \ No newline at end of file diff --git a/test/Analysis/region_store_overflow.c b/test/Analysis/region_store_overflow.c deleted file mode 100644 index 81acd41bb6..0000000000 --- a/test/Analysis/region_store_overflow.c +++ /dev/null @@ -1,13 +0,0 @@ -// REQUIRES: asserts -// RUN: %clang_analyze_cc1 -analyze -analyzer-checker=core -mllvm -debug %s 2>&1 | FileCheck %s - -int **h; -int overflow_in_memregion(long j) { - for (int l = 0;; ++l) { - if (j - l > 0) - return h[j - l][0]; // no-crash - } - return 0; -} -// CHECK: {{.*}} -// CHECK: MemRegion::getAsArrayOffset: offset overflowing, returning unknown