2013/11/25 Guy Harris <g...@alum.mit.edu>:
>
> On Nov 24, 2013, at 2:59 PM, Guy Harris <g...@alum.mit.edu> wrote:
>
>> I've removed -ftrapv; we'll see what that does.
>
> That fixed it.
>
> Either Lemon is explicitly depending on wrap-around on signed integer 
> overflow, or implicitly depending on a lack of trapping for signed integer 
> overflow; in the latter case, perhaps it should be checked to see whether 
> that's a bug.
I tried to trigger a crash using GCC and -ftrapv without success while
the clang-compiled binary crashed as expected:
test.c:
#include <limits.h>
#include <stdio.h>

int main () {
  int i = INT_MAX - 1, b = 100;
#ifdef TEST
  if ((i + b) < i) {
    printf("overflow!\n");
    return 1;
  }
#endif
  i += b;
  printf("res:%d\n",i);
  return 0;
}

$ gcc  -ftrapv -o test.out test.c && ./test.out
res:-2147483550
$ gcc -DTEST -ftrapv -o test.out test.c && ./test.out
overflow!
$ clang -DTEST -ftrapv -o test.out test.c && ./test.out
Illegal instruction
$ clang -ftrapv -o test.out test.c && ./test.out
Illegal instruction

I agree that -ftrapv seems to be unreliable on GCC or at least it has
more complicated semantics than I expected.
The lemon crash is interesting anyway. Can we somehow obtain the core file?

Cheers,
Balint

PS: Thanks for removing -ftrapv, I think having the rest of the new
flags enabled make sense.
___________________________________________________________________________
Sent via:    Wireshark-dev mailing list <wireshark-dev@wireshark.org>
Archives:    http://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
             mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe

Reply via email to